19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

836 Chapter 21 n A Web Application Hacker’s Methodology<br />

7.7.3 If you find a remote file inclusion vulnerability, deploy a <strong>web</strong> server<br />

containing a malicious script specific to <strong>the</strong> language you are targeting,<br />

and use commands such as those used to test for script injection to verify<br />

that your script is being executed.<br />

8 Test for Function-Specific Input Vulnerabilities<br />

In addition to <strong>the</strong> input-based attacks targeted in <strong>the</strong> preceding step, a range<br />

of vulnerabilities normally manifest <strong>the</strong>mselves only in particular kinds of<br />

functionality. Before proceeding to <strong>the</strong> individual steps described in this section,<br />

you should review your assessment of <strong>the</strong> <strong>application</strong>’s attack surface to<br />

identify specific <strong>application</strong> functions where <strong>the</strong>se defects are liable to arise,<br />

and focus your testing on those.<br />

Application mapping results<br />

8.1. SMTP<br />

injection<br />

8.2. Native<br />

code flaws<br />

8.3. SOAP<br />

injection<br />

8.4. LDAP<br />

injection<br />

8.5. XPath<br />

injection<br />

8.6. Back-end<br />

request<br />

injection<br />

8.7. XXE<br />

injection<br />

Figure 21-9: Testing for functionality-specific input vulnerabilities<br />

8.1 Test for SMTP Injection<br />

8.1.1 For each request employed in e-mail–related functionality, submit each<br />

of <strong>the</strong> following test strings as each parameter in turn, inserting your<br />

own e-mail address at <strong>the</strong> relevant position. You can use Burp Intruder<br />

to automate this, as described in step 7.1 for general fuzzing. These test<br />

strings already have special characters URL-encoded, so do not apply<br />

any additional encoding to <strong>the</strong>m.<br />

%0aCc:<br />

%0d%0aCc:<br />

%0aBcc:<br />

%0d%0aBcc:<br />

%0aDATA%0afoo%0a%2e%0aMAIL+FROM:+%0aRCPT+TO:+

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!