Page 205 - Hands-On Bug Hunting for Penetration Testers
P. 205

Other (Out of Scope) Vulnerabilities                                       Chapter 12

            Non-Critical Data Leaks ` What Companies

            Donct Care About


            In $IBQUFS  , Access Control and Security Through Obscurity, as part of our discussion about
            access control, security by obscurity, and data leakage, we briefly covered different types of
            data that companies weren't interested in rewarding: usernames, descriptive-but-not-
            sensitive error messages, different kinds of error codes, and so on.

            Here are some other, specific examples about information that security researchers often
            report, but that companies very rarely pay for.


            Emails


            Emails are an item of information many people try to deny to bots and automated agents
            crawling their site. One typical strategy is encoding email links as HTML entities to make
            them harder to collect. That means you can hide an email such
            as  OFTTVT!HFOFSBMQSPEVDUT CJ[ as the following entity code:

                OFTTVT!HFOFSBMQSPEVDUT CJ[
            Unless the crawler is expecting to detect and decode entities as part of its scraping process,
            this little obfuscation trick can be surprisingly effective.

            But if an email is exposed on a company site, it's usually meant to be a public-facing handle.
            Submitting a bug report about TVQQPSU!DPNQBOZ DPN or even because you've deduced
            the employee email naming convention is something like
            MBTUOBNF GJSTUOBNF!DPNQBOZ DPN doesn't meet the standard for a payout.
            There are too many extra steps beyond simply enumerating a company's email username
            registry before the disclosure becomes a vulnerability.


            HTTP Request Banners


            HTTP banners are an integral part of the protocol that stitches the entire web together. On
            common services, that might be privy to many different types of devices. They can include
            encoding data, device information, general information about the nature of the HTTP
            request, and other data.






                                                    [ 190 ]
   200   201   202   203   204   205   206   207   208   209   210