Page 228 - Hands-On Bug Hunting for Penetration Testers
P. 228

Assessment

                   5.  Testing for XXE using simple entity subsitution is an easy, lightweight way of
                      validating XXE bugs.
                   6.  The "Billion Laughs" attack is not unique to XML; it is the use of nested entities to
                      consume exponential memory and DoS the parsing service.
                   7.  Even though some services explicitly use JSON for passing data, their underlying
                      servers often have the capacity to use different data formats. Sometimes, doing
                      something as simple as using a different $POUFOU 5ZQF heading can allow you
                      to unlock these formats.


            Chapter 8


                   1.  Security through/by obscurity is a valid way of discouraging opportunistic
                      attacks, but it cannot be the foundation of a sound security strategy.
                   2.  API keys, access tokens, passwords, and account and application data are all
                      commonly reported for bounties.
                   3.  The Burp Proxy contains settings for passively uncovering hidden fieldsba
                      simple hack.
                   4.  An API key grants blanket access to an API or service. An access token is
                      typically associated with more individual/role-based authentication systems,
                      though this is not a hard and fast distinction.
                   5.  Generic error codes and descriptions, browser "autocomplete" functionality, and
                      information that generally doesn't provide an associated attack scenario, does not
                      typically merit a reward.
                   6.  It is always a mistake to trust user input.
                   7.  Web applications are leaky, but error messages, hidden fields, and client-source
                      code are all areas where sensitive information lurks.

            Chapter 9



                   1.  CVE stands for Common Vulnerabilities and Exposures. It is a system for
                      allowing different tools and organizations to share data about known
                      vulnerabilities.
                   2.  WordPress is used by such a gigantic portion of the web that it makes a rich
                      target for hackers. Also, PHP, as a dynamically-type language, has its own
                      weaknesses.





                                                    [ 213 ]
   223   224   225   226   227   228   229   230   231   232   233