A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, database record, or key, as a URL or form parameter. An attacker can manipulate direct object references to access other objects without authorization, unless an access control check is in place.
out how to download, install and use this project.
First, ensure that Burp is correctly configured with your browser.With intercept turned off in the Proxy "Intercept" tab, visit the web application you are testing in your browser.
Visit the page of the web application you are going to attack.Then click the "My Bank Accounts" link from the "Account" drop down menu.
Return to Burp.In the Proxy "Intercept" tab, ensure "Intercept is on".
In your browser, reload the page.
View the request in the Proxy “Intercept” tab.Right click on the raw request to bring up the context menu.
Click “Send to Intruder.”
Go to the “Intruder” tab, then the “Positions” tab.Use the “Clear” function to remove the preset payload positions..
Highlight the section of the URL that refers to an object. In this case the user number in the URL.
Use the "Add" button on the right of the request editor to add the selected payload position.
Next, go to the “Payloads” tab.Here you can select a payload type to suit the attack you are implementing. In this case select "Payload type:" “Numbers” from the "Payload Sets" options.
Beneath “Payload Options “you can choose the number range and increments.
In this example we are using the numbers 1-1000 in increments of 1.
In the “Intruder attack” window you can sort the results of the attack by a variety of means.In this example we can use “Status” and/or “Length”.
To perform further investigation of interesting results, you can:- Send the item to the Repeater tool, via the context menu.
- Copy the URL, via the context menu, and paste it into your browser.
- Explore the request and response in the attack window.
Additionally, you can use the "Grep - Extract" function to add the user names to the results table.Go to the "Options" tab in the attack window.
Then locate the "Grep - Extract" options and click the "Add" button.
Here you can define the location of the item to be extracted from the HTTP response.
With the grep extraction configured, the results table will be
populated with the defined items, in this example the usernames of other
account holders.
You can use Burp Scanner alongside your manual testing methodology to quickly identify many types of common vulnerabilities.
Aucun commentaire:
Enregistrer un commentaire