19.09.2017 Views

the-web-application-hackers-handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 20 n A Web Application Hacker’s Toolkit 773<br />

Figure 20-16: TamperIE lets you modify HTTP request details<br />

within Internet Explorer<br />

Standalone Vulnerability Scanners<br />

A number of different tools exist for performing completely automated vulnerability<br />

scans of <strong>web</strong> <strong>application</strong>s. These scanners have <strong>the</strong> benefit of being able<br />

to test a large amount of functionality in a relatively short time. In a typical<br />

<strong>application</strong> <strong>the</strong>y often can identify a variety of important vulnerabilities.<br />

Standalone <strong>web</strong> <strong>application</strong> vulnerability scanners automate several of <strong>the</strong><br />

techniques we have described in this book, including <strong>application</strong> spidering,<br />

discovery of default and common content, and probing for common vulnerabilities.<br />

Having mapped <strong>the</strong> <strong>application</strong>’s content, <strong>the</strong> scanner works through<br />

its functionality, submitting a range of test strings within each parameter<br />

of each request, and analyzes <strong>the</strong> <strong>application</strong>’s responses for signatures of<br />

common vulnerabilities. The scanner produces a report describing each of<br />

<strong>the</strong> vulnerabilities it has discovered. This report usually includes <strong>the</strong> specific<br />

request and response that <strong>the</strong> <strong>application</strong> used to diagnose each reported<br />

vulnerability, enabling a knowledgeable user to manually investigate and<br />

confirm <strong>the</strong> bug’s existence.<br />

A key requirement when you are deciding whe<strong>the</strong>r and when to use a<br />

vulnerability scanner is to understand <strong>the</strong> inherent strengths and weaknesses<br />

of <strong>the</strong>se types of tools and <strong>the</strong> challenges that need to be addressed<br />

in <strong>the</strong> course of developing <strong>the</strong>m. These considerations also affect how you<br />

can effectively make use of an automated scanner and how to interpret and<br />

rely on its results.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!