Page 11 - Hands-On Bug Hunting for Penetration Testers
P. 11

Table of Contents

                A simple XXE example                                                          116
                XML injection vectors                                                         118
                XML injection and XXE – stronger together                                     119
                Testing for XXE – where to find it, and how to verify it                      120
                XXE – an end-to-end example                                                   120
                    Gathering report information                                              125
                       Category                                                               125
                       Timestamps                                                             125
                       URL                                                                    125
                       Payload                                                                125
                       Methodology                                                            125
                       Instructions to reproduce                                              126
                       Attack scenario                                                        126
                       Final report                                                           126
                Summary                                                                       127
                Questions                                                                     127
                Further reading                                                               128

             Chapter 8: Access Control and Security Through Obscurity                         129
                Technical Requirements                                                        129
                Security by Obscurity – The Siren Song                                        130
                Data Leaks – What Information Matters?                                        131
                    API Keys                                                                  131
                    Access Tokens                                                             131
                    Passwords                                                                 132
                    Hostnames                                                                 132
                    Machine RSA/Encryption Keys                                               132
                    Account and Application Data                                              132
                Low Value Data – What Doesn’t Matter                                          132
                    Generally Descriptive Error Messages                                      133
                    404 and Other Non-200 Error Codes                                         133
                    Username Enumeration                                                      133
                    Browser Autocomplete or Save Password Functionality                       133
                Data Leak Vectors                                                             134
                    Config Files                                                              134
                    Public Code Repos                                                         134
                    Client Source Code                                                        135
                    Hidden Fields                                                             135
                    Error Messages                                                            136
                Unmasking Hidden Content – How to Pull the Curtains Back                      136
                    Preliminary Code Analysis                                                 136
                    Using Burp to Uncover Hidden Fields                                       136
                Data Leakage – An End-to-End Example                                          138
                    Gathering Report Information                                              141
                       Final Report                                                           142


                                                     [ iv ]
   6   7   8   9   10   11   12   13   14   15   16