19.09.2017 Views

the-web-application-hackers-handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

792 Chapter 21 n A Web Application Hacker’s Methodology<br />

perform a more effective password-guessing attack against <strong>the</strong> au<strong>the</strong>ntication<br />

function.<br />

n Discovering a key vulnerability in one area of <strong>the</strong> <strong>application</strong> may enable<br />

you to shortcut some of <strong>the</strong> work in o<strong>the</strong>r areas. For example, a file disclosure<br />

vulnerability may enable to you perform a code review of key <strong>application</strong><br />

functions ra<strong>the</strong>r than probing <strong>the</strong>m in a solely black-box manner.<br />

n The results of your testing in some areas may highlight patterns of recurring<br />

vulnerabilities that you can immediately probe for in o<strong>the</strong>r areas.<br />

For example, a generic defect in <strong>the</strong> <strong>application</strong>’s input validation filters<br />

may enable you to quickly find a bypass of its defenses against several<br />

different categories of attack.<br />

Recon and analysis<br />

1. Map <strong>application</strong> content<br />

2. Analyze <strong>the</strong> <strong>application</strong><br />

Application logic<br />

Access handling<br />

Input handling<br />

Application hosting<br />

3. Test client-side<br />

controls<br />

4. Test<br />

au<strong>the</strong>ntication<br />

7. Fuzz all<br />

parameters<br />

10. Test for shared<br />

hosting issues<br />

9. Test for logic<br />

flaws<br />

5. Test session<br />

management<br />

8. Test for issues<br />

with specific<br />

functionality<br />

11. Test <strong>the</strong> <strong>web</strong><br />

server<br />

6. Test access<br />

controls<br />

12. Miscellaneous<br />

Checks<br />

13. Information<br />

Leakage<br />

Figure 21-1: The main areas of work involved in <strong>the</strong> methodology<br />

Use <strong>the</strong> steps in this methodology to guide your work, and as a checklist to<br />

avoid oversights, but do not feel obligated to adhere to <strong>the</strong>m too rigidly. Keep

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!