Placeholder Image

字幕列表 影片播放

  • this is how to shot web web hacking and mobile hacking in

  • 2015. I really appreciate everyone being here he's way

  • smarter than me this is me I work for bug crowd I'm director

  • -- I manage a team of hackers behind the scenes by bounty can

  • you write the program. In 2014 I participated as a researcher.

  • This talk is about my mend I use to do web hack king as well as

  • stuff I learned from other researchers while doing this

  • work. What is this really about. It's just -- I put a lot of --

  • my wife says it's okay. So more specifically what I did I

  • started off with my mend which is a pen tester mend when I

  • started doing this, application assessment. And so, I then went

  • out manually parse d out all of the public researchers of all

  • the badasses bug hunter I new about a hundred visit -- -- as

  • well as people I new were good at it I went through ever

  • article from the beginning of the crowd source bug bounty seen

  • and also all of the Google and Facebook plans inter Bryce -- I

  • created a presentation what I disstilled around that

  • knowledge. This is kind of the stuff I'm going to bring in this

  • presentation. Bug bounty testing from web -- discovery

  • techniques, parameters often a tack useful fuzz strings, by

  • pacer filter and some too long I think is cooler than other too

  • long. Cool. So the first sections philosophy. So the

  • differences between kind of bug bounty hunting and being a web

  • pen test templet both sides and they are both right but when you

  • get down to the practical work you introduce a lot of stuff

  • here, up under dues time ton to a security tester they are not

  • use to exesion when you are doing this kind of stuff unless

  • you are playing in CTF I played in CFF's I was kind of used to

  • it. You are only -- for what you find and not the hours you put

  • in, so, I mean this is a basic overview of how they differ the

  • talk is more about the technical stuff. Yeah, you basically

  • tailor method based around finding stuff in 20 percent as

  • opposed top 80 percent application assessment we'll go

  • into how that 80/20 rule kind of fits in the rest of the slides.

  • So if you are doing regular web app assess. -- this is usually

  • what you are trained from and what your internal method is

  • built off mostly any of the good consultants use and authors are

  • you know super great testers, right but these take from you A

  • to Z and you even though them find good bugs they take a long

  • time to complete in full scale. So bug bounties are different if

  • you want to do web hack and these are what you go for my

  • talk as little bit different. Let's talk about discovery in

  • web application assessment for a bounty. What you want to do is

  • basically find the road less traveled if you are aiming to

  • get paid I think so, you can a tack the flag ship application

  • that the company has, right. That's not where the

  • vulnerability is going to be that application has been tested

  • by a pen test team probably had a bug bounty on it for a long

  • time. Was really want to find part of the -- maybe has been

  • secure web servers on different ports. You what about to find

  • acquisition maybe the company had recently that came from a

  • different development team and they might have a whole view of

  • problems that came from a whole different group. You want to

  • look at functional will the changes and redesigns on sites.

  • Mobile websites because you are set to renter differently on

  • your phone. And also a new mobile app version when you are

  • testing. We are going to go into tools and stuff I used to find

  • for you to a tack. So recouldn't MG is this tool that a lose to

  • you do -- one part has all these modules to do subdomain

  • discovery. Now subdomain discovery is a big part of

  • finding application left out there marketing spins up a

  • sight, -- DEF -- finding those and hacking those code execution

  • through those sites is kind of where you can get big pay

  • outside. So this script what it does is it scrapes Google for

  • all -- given web property so let's say Acme.com this will --

  • for everything that is in ACME and remove those result until

  • you are down to this long list of subdomains. Also scrapes

  • being -- net craft, subdomains like common fires tool would

  • this is on get had you been wrap around reCON installed if to you

  • use -- you can pop the script in and go. Yes, so this is the

  • output of something like that against the company like this.

  • You can see -- probably a lot of domains here that have gone

  • under assessed as far as you go, so, -- this is that idea of it

  • rating through Google to find subdomains here you have sight

  • then minus dub dub dub sites I found on its first hit sand box

  • I removed that this is the scraping that the cool -- tool

  • -- is doing. You get credit plier, business or shopping or

  • advertising and you just keep on removing these until you have

  • all of them. Then you -- then you end up with a huge list of

  • sites to assess. Then you want to go through and on your entity

  • that you are attacking you want to find mergers or acquisition

  • that may be on -- they just purchased accompany, purchased

  • by Facebook they got popped as soon as they were a choired they

  • were not under Facebook six month rule I don't know if it's

  • six month I can't remember how long. But yeah they got popped

  • immediate until was a whole different DEF team. They got hit

  • with injection and custom header that was great well not great

  • but it was good for the bounty hunter. Wikipedia, update these

  • things for stock reasons so keep an eye on these if you are --

  • your company has to purchase something else they have new

  • domain may not be in the bug about tea -- there's also a

  • repository of links of ever kind of -- that's comes out on pay

  • pal and Googled. This one is post -- hosted and Facebook I

  • have no idea its linked it has everything high percent linked

  • these are the blog articles. Why is this important if somebody

  • already found these bugs. Because, bugs get represented

  • across the domain In different places. So you can tell a lot

  • about an organization once you read these articles and find the

  • same bug in other locations like the subdomains may be rogue --

  • how they filter out input you get a lot of in tell around the

  • application, so, you no really doing a lot of research on your

  • target can help but it's not the fast stuff so so port scanning I

  • mentioned port scanning, it's not just for net pen, so, yeah,

  • I mean how I hacked Facebook there was an article by Ryan I

  • started out port scanning found a weird server he got in --

  • simple as that 8,000 dollar bug right or even more I don't

  • remember. So, I asked do the net the Microsoft domain that you

  • know -- that already opened to the world with MS12 zero 20 on

  • it vulnerable so that was a thing. Go ahead and use simple

  • map syntax to start port standing all of your sites make

  • sure you check all those services this syntax will port

  • scan for all ports on a domain as well as pull out any HTTP

  • servers and display those it's a sin scan and OS -- so. So

  • mapping so you found all of these new servers right like

  • maybe subdomains or maybe you found an acquisition and

  • something like that now you want to move you want to move into

  • mapping an individual application, so, and take and

  • notes is really important when you are doing this whether

  • inside of like note pad or you know just using pen and paper

  • like I use ever note all my bugs or in Temples I can copy and

  • paste disclosure E-mail. So these are mapping tips that I

  • use right away. Google is actually your friend you can get

  • a lot of information -- I know there's parameter par sink

  • scripts I couldn't find a good one for this presentation you

  • know just parse parameters out of the Google like catch stuff

  • but really the next big thing is directory reinforcing finding

  • unlinked content content that's not supposed to be there. A lot

  • of beam use content discovery for this kind of thing that's

  • good they are good list but those list were created by going

  • out spider the internet and then prioritizing them. There's some

  • other lifts that are better for this type of work, so, the list

  • or these list that came out of talk maybe four or five years

  • ago raft was application proxy it was a decent one but since

  • been discontinued its list for directory reinforcing has lived

  • on. They are a spider of the internet robot do the text files

  • everything that everybody doesn't want you to see is in

  • this directory group forcing list super sick I can't tell you

  • how many bugs I found just using this list like couldn't figure

  • files all over the place. There's another list like this

  • they went out and spider all the project if your sight or target

  • is open source place you can take all the paths have have

  • been -- get application or find config files. So after you do

  • some unlink content discovery or directory re-- you can try to

  • identify platform. So, there's just some really simple wins

  • here -- you can alcoholic and looking at the heeders the

  • comments in the pages analytic things that have been integrated

  • they will give you the whole server stack they will give you

  • version numbers if they can identify them. Retire do the JS

  • one of my new favorite it will profile all of the server side

  • Java script -- as well as give you all the vul never viability

  • before that patch or your vulnerable -- list of prioritize

  • process script tig. Once you identify all of these server

  • version numbers check nor CVE and server type stuff that's

  • standard that's web stuff. But these are good -- tools. Have

  • you happen tho come across SMS you want to use these two tools

  • curative scan for word compress a lot of people use this

  • already. It will identify all plug ins and users for word

  • compress install as well as look up any bones that are associated

  • with those plug ins that have been disclosed. And then SMS map

  • for -- and what is the other SMS -- so those are the two that

  • have really yielded any value for me across SMS. You see a

  • screen shot of curative scan. And its you know found aversion

  • of a plug in or theme that has a file -- sometimes there's false

  • positives honestly for what this script does it provides so much

  • value so its great. So the directory we talked about a

  • little bit earlier the work flow for this a lot of people do I

  • just put this slide in here because I see a lot of people do

  • it a little bit weird I see people -- off the top level path

  • a lot and then just stop right they'll get errors don't know

  • what to do with it they'll go to Acme.com and go to 200, 404, and

  • more 404 you know there's nothing there then they'll hit

  • control panel and see 401 I can't do anything I'm not

  • authorized right so they -- after control panel there's so

  • many like messed up access control on web server bugs you

  • can explicit if you route -- I just see this a lot where people

  • stop after the top level domain that's kind of the work flow you

  • are doing there. Some other things that you can do is

  • mapping and bone discovery using open source intelligence. Five

  • sites six methods that you can use to find already publish bugs

  • or almost all right public bugs I guess they are considered --

  • or whatever access .com, punk spider a burden of proof engine

  • that scans the internet if your car get is a high profile sight

  • information might all right be in here you can pull it out and

  • use it to your van tach. Even if those bugs have already been

  • disclosed. I found bugs on here not dis-- that's actually worked

  • before it was like a super easy win. Help you get a feeling for

  • what the company has faced before as far as prevalent

  • across side -- file up loads and then you can do regression

  • testing on all the domains up found earlier in the

  • presentation. Go out and use these resources to try and find

  • bugs in the platter form as quickly as possible they are

  • free and out L the customer should know about them any way

  • its the responsible thing to do. Okay. So this is my intern Ben,

  • he's never spoken before at DEF CON neither have I this is my

  • first speaking but he did an awesome project and he's going

  • to talk about it for a couple seconds I really like it so. >>

  • [Applause] >> So hello everyone my name is Ben. I'm on Jason's

  • team. For the past couple months we actually gathered a bunch of

  • files that includes all the date to for each Bugs Bunny program

  • that's out there 200 visit plus programs that are included in

  • this project they include how much a minimum is how much a

  • maximum is, what's not included in the scope of the program as

  • well. We use all this data and fed it into different scripts

  • like CC on -- it just went through every single one of

  • those programs and -- for subdomains. And this also is

  • available on get had you been account and everyone can be in

  • and use it if they want to. This is Yahoo's program a couple

  • months ago -- what we have is record that shows that's the

  • Yahoo.com all -- end flicker and all supplements of flicker

  • included in scope as well as all mobile apps included as well you

  • can see there's two dope maintenance which is Yahoo do

  • the net and subdomains and Yahoo.com itself not included in

  • the scope of the program. What we ended up doing with this

  • using Ruby we wrote a script fed ever -- file and we crawl them

  • and using -- for example for this one we -- and you can see

  • there was disclose a dough -- just close a domain there's a

  • you bunch of sites out there that you can easily report and

  • report to venture. Taking it further we, same idea use all --

  • and we fit that into in treating which in treating is API

  • framework that is for intelligence gathering and it

  • does a bunch of tasks that you can see on the left side of the

  • screen includes doing -- web spider end map and you name it

  • we can do it with in treating. Also in treating is available on

  • get H U B as well go ahead and commit to it if you need to.

  • What we ended up doing for in treating we parse d every file

  • with -- and you can see it says R, we are taking the task DNS

  • boot sub-- and give it an entity and option all included in the

  • manual and we are running that for Jason file the bottom shows

  • its being assigned an ID that you can just go in local host

  • and check it out and see what in treating has found. So for

  • example we did in treating IO and for DNS root force you can

  • see all those subdomains that have been out there that in

  • treating found with IPI addresss as well. And make sure you guys

  • check it out like I said it's on line -- the possibility, -- you

  • can do whatever you can think of it. Being a bug bounty hunter I

  • think it's huge for -- useful for everybody out there. >>

  • [Applause] >> Yeah. That's a sick tool and sick framework

  • both wrapping and reCON entry facility you've used -- I love

  • both those tools using them both if you can in treating is going

  • to be sick you guys should check it out so. Okay. So onto I'm

  • going to have to blow through some of this. This presentations

  • long. The one thing I want to say these are low -- the problem

  • is if people start not paying attention to them you can't --

  • multiple bugs or I've have multiple bugs where where we've

  • had a couple small issues like with pass pass or resets

  • something like that we chain them to make like a critical

  • account taker these are really important these are the kind of

  • bugs that a lot of people see and like the hash tag beg a

  • bounty people really don't like them. Don't discount them just

  • note them if they that are out of scope don't discount them.

  • That's what I have to say about some of these. So session -- the

  • kind of same thing failure to -- new -- no new cookies -- these

  • are all things are going to be able to use later a lot of times

  • they are out of scope so either you are out of scope or

  • unappreciated or due or something like that yeah, you

  • should keep them in mind when you continue testing they can

  • be. So the big part of this one is tackle fuzzingville -- we are

  • going to talk about cross sight scripting some really good

  • people have done the core idea of process scripting page

  • functional will the display to the user that's kind of the

  • question I ask myself you know can I get refreaks somehow with

  • Java script so you can do manual test king Q which is great you

  • can enter in your many character and see if they return but

  • really when I'm trying to work fast in a bug BON -- so, you

  • probably used them before the technical definition for them is

  • web POLLY -- first one you will recognize they used to call it

  • the R snake battering ram came out of -- you probably used this

  • before you pray that you get across sight scripting this is

  • multi context fillet by pass -- it's a mouthful I know. Its

  • designed to evade filter it's a loud to execute In different web

  • couldn't Detective and it's really cool so I have three of

  • these that eyesight here that if you are just doing bug down tea

  • hunting you can use and just kind of move a along on critical

  • functions in the sight S this one is from a researcher he does

  • cross sight -- I think he did Ph.D in cross sight scripting

  • which to me mows my mind. This is a multi context -- so you can

  • see here that he's trying to to markup in a whole burning of

  • different context he's got like an at sign here to like trick

  • trick E-mail like filter or maybe -- so he actually ran this

  • along like top one hundred and like 80 percent of them

  • vulnerable with search parameters with this string more

  • AMMO. This one is done by MATH -- so he did a whole

  • presentation on this idea of multi or payloads on websites so

  • this is his multi context so this is one that I use now so

  • thank you. Other observation when I started parse sink bug

  • bounty work is important so finding cost missable themes or

  • profiles that you -- trick them into using Java -- any

  • application that deals with those type of things you are a

  • pull things from U RI and render it for some reason. Import ting

  • from a third party like Facebook immigration where there may be

  • -- displace Facebook data in line so you can set your name on

  • Facebook to script alert and will alert this sight. -- that

  • didn't -- a lot of people discount web services right away

  • because they think the content time won't execute across sight

  • scripting won't execute Java script so you have to really

  • check and make sure they are returning otherwise you can get

  • -- and a lot of -- file up load names try to change it to script

  • alert whatever like that its -- a of the places up loaded files

  • themselves this as huge one actually that's all over the

  • place so compiled file or HTML file and you basically a tack a

  • file up load and so a lot of you know file up loads there's a

  • whole section about file up loads we'll talk about it more

  • in a little bit. Custom error pages where they are he can

  • company winning what you can't find. Make parameters -- put it

  • into your response and then log in and figure out password

  • forms. Also, this is a swift parameter access that is a huge

  • thing I don't think I've ever found a swift file that I

  • decompiled that hasn't been vulnerable or remote file

  • include actually Dennis here is like the guy I ask question all

  • the time. So, yeah, so, things like J player and all of these

  • software that are swift files that do media or whatever like

  • so there's a whole -- on the common programs that these

  • players use and then also the injection strong you have to do

  • more manual analysis to do that manual oh I use this flash bang

  • which I think is awesome you drop a swift file on the on the

  • end cups out all the program -- dash displace them along with if

  • they are going to execute out of the context of the swift file I

  • highly suggest this tool if you are going to do some swift

  • hacking way better than like a lot of the old once. Cool. So --

  • does the page look like it might need to call or stored data

  • obviously. SQL I where it will execute in single quote, double

  • quote and straight into -- context. I've seen a lot of --

  • remember these are things that actually scanners are starting

  • to do they don't want to send a -- you have ate million

  • parameters on a page takes forever to scan things, right.

  • So I imagine a lot of scanners will start to pick up on this

  • kind of thing the idea of these multi context injection strong

  • this is awesome as well. So for injection to kind of go through

  • and fuzz things I use SECT list project its got a bunch of

  • fuzzing list and all this crazy stuff Daniel here actually

  • helped me curate it we designed it together and its it's in

  • valuable right its got like buy type of injection if you want to

  • do a log in by pass in my shekel its got all those K -- C. RATED

  • I highly suggest using this when I want to attack a form or

  • something like that some parameter I think ses vulnerable

  • so. -- so other observations to blind is the predominant -- you

  • hardly ever get -- in those cases bench mark strong and

  • stuff to make the page take a long time to load that's how you

  • identify whether you take it the whole explicit way up to you we

  • have a lot of researchers just want to identify and move on I

  • like to run see y'all map it's still king there's no other tool

  • that does it as good as SEQ U EL map. Everybody uses the map at

  • some point. So, yeah, some tips tore the map basically when you

  • are doing this you can actually parse a whole burden of proof

  • blog file parse fuzz the whole file it takes forever it's not

  • like the greatest way to do things its offering a lot of

  • coverage. If you are up against some kind of black list or

  • something like that it has tamper scrips you can use in

  • code all of your - you can evade black list. There's a good guide

  • on there, its somewhere on the form DBMS specific syntax -- so

  • if you are going up against -- there's a simple string you can

  • pass into map and get past black list A really fast way to in

  • instrument the map is -- basically allows to you right

  • alcoholic any window and Burp and request that to API running

  • on local box you can be inside a Burp right click and start

  • searching CLICK and start searching. Currency value item

  • number values sorting parameters I'm not going to go through all

  • these they are along lt slide this ses going to be on the hub

  • any way you can grab it and use it if you think its useful these

  • are the kind of place where I saw the most injection and --

  • this is sore right click on a request send it pi scan now that

  • Burp -- -- doesn't look like this anymore but you get the

  • idea. So this is my cheat sheet of S U L when I do broken down

  • by my skill type these are cheat seats that let you know manual

  • syntax a lot of these people pen test -- you have to use these

  • you have to have them handy when you are doing injection, access

  • who use access that suction, [indiscernible]. So, I keep

  • those handy in May ever note when I'm doing S U L injection

  • testing when I see errors something like that I just I

  • start you know getting in that mowed. So file up loads and file

  • inclusions next area. So local file inclusion the core idea is

  • does it or kit interact with server file system.

  • [indiscernible] obviously you can do it manually I have

  • allomorph LFI scripting stuff up. You can see here like I

  • tried a bunch of black list bypass to try to get common

  • system files this is on the project. Common parameters or

  • injection funds for this type of stuff you would think of this

  • but its good to have it in the list file location, locale,

  • path, display load, read or retrieve these are the most

  • common parameters that you will find those in. Malicious file up

  • loads. This is an important -- doing this type of testing not

  • only just to up load swift file and get SS -- you can -- one of

  • the ones I like a lot it's a DOS basically answering image? >>

  • Specifies itself to be large but isn't you can up load it in the

  • server we'll allocate all of this space not that big of zoo

  • file you can dos the application server there's a whole blog on

  • it. And then, you can you can actually one the things I think

  • is interesting I'm into the going to go into it interesting

  • buy passing security zones and store ring Malware so there's as

  • well as poll -- payloads there's also files that can execute code

  • In different context you think of a parse or reading a file it

  • basically will look until it finds what it wants and execute

  • that you can create ajar that is subtle so if I make executable

  • -- allow ajar is that -- well I don't know you can storing

  • Malware on your - I can send -- to go retrieve it can you do

  • anything about that right. And cut stuff out I don't think so

  • that's kind of hard to do. Interesting question there it's

  • kind of another road. Dan Crawley did a presentation on it

  • here at DEF CON it was super sweet so -- you should check

  • that out. Oh, no. Technical errors. That came at the perfect

  • time, actually. Oh wow. That's what we're doing. >> So who a --

  • he's a first time speaker. There's a story while we getting

  • ready. I guess he mentioned that DEF CON16 he met someone. >> I

  • met Julia my wife here. >> He met withs his wife here. Give

  • him a hand, huh. >> [Applause] >> Cheers. Now back to the show

  • I mean if I can deal with the laptop issue. Are these guys

  • doing all right. Should I kick them off the stage or do you

  • want to keep listening to them you want to keep listening. All

  • right. I guess you can stay. >> Okay. All right. Can you give me

  • a second until my throat stops burning. >> No. >> All right.

  • All right see if this works. -- all right let's -- so follow-up

  • load attacks are a thing I've never seen any better

  • presentation along the road file up load attacks than this guy,

  • if I mess up your names I'm sorry I love all these guys they

  • are bug hunters just like me. This includes doing new and

  • attacks as well as old attacks. Up load by passing extension

  • trickery I'm trying to give you resources as well as the ones I

  • would use so a lot of this I think got parse d into the new

  • testing guide most of it at least. So, I would check that

  • out too. As an intro to malicious file up loads and

  • getting shells so -- oh this is what I talked about Dan I don't

  • know that guys real name, but, yeah, these are the types of

  • files that can execute In different ways. So you can see

  • they have like a PDF that's a zip or NBR interesting research

  • here coming out I would like to see interesting bugs come out of

  • it. So, remote file includes and redirect, common parameters

  • there destination continue redirect, U RI window next.

  • Common black list by passes, these are all kind of escaping

  • tricks you use normally in web stuff these are the most common

  • once I found these are also in SECT list that I use often. So

  • for RFI these are the common parameters file folder pass file

  • template yes yes yes yes. So, these are where I saw the most

  • bugs or you know other researchers published data

  • around their RA -- RFI these are the type of parameters you can

  • do. I think eventually the thing you do here, as you right a -- I

  • haven't yet but that automates any time you see these it sends

  • it to -- so you can just go test them later. I haven't done it I

  • do it with eyeballs it's probably the bet way to do it is

  • write an extension to do this work. How much time do I have

  • ten minutes okay I think I can do it. If everybody knows about

  • see suffer you find some function in the website that

  • does something, right, and it's a security related function

  • change password or whatever right there's a list latest

  • function then you write alcoholic and Burp that's -- so

  • what you have to focus on is C -- so common buy passes in my

  • research yielded removing the toe Ken from the request,

  • removing the parameter value from the request adding control

  • dashed -- or changing the requested method. So check this

  • out. This tool has gotten no love I don't know why I think

  • it's been out two -- for two years. Any of you used this tool

  • before no good give you something to take away. What it

  • does you enforced able -- and you crawl a sight that -- in it

  • like a C -- you create this template tell it what the TOKEN

  • was what an air page looks like this is really easy to add. This

  • has been out for I think two years already I don't understand

  • why people want to use this super sweet right you write this

  • it's a pie Anthony script then you run his PYTHON request all

  • those across the whole domain, yes, sir request with those

  • first three attacks then it produces HTMB -- L report which

  • one gave error messages pry or -- sew made a lot of money doing

  • this to Facebook and at this time because it wasn't direct

  • extension it didn't get a lot of notice Iran dimly found out and

  • I said sweet this is awesome this is part of the extreme

  • output here's the base request here's the first drafted request

  • and response and then you get a report back saying if they came

  • back the same. So, I highly suggest that tool its linked in

  • the talk. Another way to do it just to check for every request

  • across a whole file that didn't have the TOKEN in it. The actual

  • parameter so this is another scripted that does that its

  • another script that runs on a file that went undetected kind

  • of a little bit super sweet. I use these all the time it finds

  • bugs all the time so. So just a common critical function like

  • add and up load file, you know, password change, E-mail change

  • transfer money country tea, delete a file, add a profile,

  • things like that, so these are commonly where you see it.

  • Privilege transport and logic kind of get mashed into a

  • section. So, privilege, you know, -- but my testing thing

  • you have administrative user you need a couple counts to do this

  • then you have a low privilege user the low privilege user

  • tries to -- pretty simple. Ought mate that across multiple

  • function you might need too long this is what I use for is it

  • this one is available on Burp store and basically you spider a

  • site completely. You run through it. All of your post requests as

  • as ADMIN user then go in as a lower user and you give that

  • information -- was able to access that the ADMIN user I was

  • also able to access you look through those in your output. So

  • common function or views that I check for privilege escalation

  • or anything like that these can be combined with last two

  • seconds add a user delete a user start project change account

  • info, view customer -- there's a page that tells everything about

  • what that site does you want to try that view. Payment

  • processing view like receipts or any view any with PI on it you

  • want to focus on this is what that looks like. Again with low

  • privilege user request everything gives you pry or

  • advertised output. Prioritized look. >> Game mink head phones a

  • couple months back, so, I found a bug in a really cool company

  • and I had to disclose it and ended up call them on the phone

  • and their help desk guy was I have no idea what you are

  • talking about. Thing I actually linked -- of the IT group of

  • that company finally someone accepted I told him I'm

  • legitimated I just want to tell you this exist because I was

  • buying a pair of head phones already and they may fix this

  • bug. So, yeah and so the receipt function -- you could it rate up

  • and down and fine other people's receipts with credit card on it.

  • They sent me two free pair of head phones I have one one goes

  • to Daniel for his birthday but I forgot to bring it. I'm sorry,

  • Dan. But there's -- any way five minutes. Okay. Cool. Increment,

  • key crash., sense five tongues, stewing user ideas these are how

  • you test. These are common functions user fires that deal

  • with [indiscernible] everything from the table everything that

  • says user hash E-mail images that are supposed to be private

  • so you can go through the slides and kind of go through this all

  • of this is going to be on -- this as simple, I don't know why

  • I put -- you see this newspaper -- new miracle -- this is

  • exactly what I did. This were you what a disclosed bag that

  • was patched. Transport -- there's this awesome script that

  • will take up blog file again request ever request in your

  • sight tree -- so you can see what's going over on unsecure

  • channels instead of having to sort columns and all that stuff

  • I find this useful try to downgrade everything then you

  • report this is SSL downgrade attack or whatever. Logic, logic

  • are us usually manual, the one I see a lot of styting hash

  • parameters where there's -- they've -- irreversible or I'm

  • too dumb to reverse it just finding another item -- and so

  • doing that is usually yield the product for less money so, step

  • manipulation this is like the bread and butter example

  • everybody gives multiple steps order or put things in -- check

  • out, pay, ship, so you just skip or you like put everything in

  • your cart and you just ship because you have the whole

  • process, so you just skip a process. Using negative

  • quantities in -- or using negative in quantity value so

  • actually had websites pay me credit because I put in a

  • negative value on some pricing or or negative quantity right

  • like order number equals one usually I want to buy one thing

  • I put in negative 20 now they dread Ted my account like a

  • thousands or something like that. So application level DOS

  • this is interesting not actual DOS, right I'm not add

  • indicating bug BONNTY I've seen sites that can't handle just

  • like parse go a parameter with you know 40 zero or me putting

  • in a math function as a parameter value server like I

  • don't know what to do so those are interesting and then timing

  • attacks I think there was a DEF CON talk about -- mobile I'm

  • running into -- check these files for data storage as well

  • as logging this is the best tool to get spun up. Basically jail

  • -- it gives you full list of the hand her of all of the files all

  • of the encryption val use. If it's using explicit -- most

  • functional tool. I think it's partly based off of talk I gave

  • a long time ago and he made it in rube be and its super sick

  • its the best way to get into IOS testing if you've never done it

  • before. This is a thing babblings we got to go there's

  • other -- I repeat them don't discard them. Security head did

  • he path disclosure keep them in your pocket later to escalate if

  • you can use them. This is one idea of like you know if I have

  • five or 30 minutes or something like that, what can I do so I

  • try to time myself wimpled using this stuff in here so in 15 to

  • 30 minutes I can doomiest of this using Burp and the

  • automation maybe an hour depend how motivated I am these are the

  • steps I go through, I register hit password resetting do all

  • the forms go to security function check the cookie, I do

  • like like perform enumerate or U ID I see in U RD, using one of

  • the short list in the background up load a file if it had up load

  • win 30 minutes or an hour I can usually find some pretty corner

  • good bugs. Crowd source is different. It's a the same but

  • different. You find like 20 percent of the stuff instead of

  • 80 percent a lot of stuff goes quick of the data analysis is

  • cool. You can probably do a 15 to 20 minute web test done --

  • [indiscernible] and follow all of the bug bounty people on the

  • list. I put them on a list for you you can watch them hack

  • things and talk about their find and. There's a lot of stuff that

  • didn't get put opinion here there's a lot of data visit

  • percent of the data is still unparsed I'm going to put it up

  • as or maybe just mark down and you guys can contribute to it if

  • you care enough if you just want to ticket and use it that's

  • fine. Stuff to go in there more too long that I found XXE, meant

  • to say [indiscernible] techniques, more detail and to

  • add an toyed mobile tools that I use often. -- we good. Thanks.

  • These are bug hunters that did -- who did things in this

  • presentation all of them are awesome I respect every single

  • one of them or who made tools. Also my team John Todd, Patrick,

  • Katie, Kim consideration case see criss and Sam everybody in

  • the -- I love doing this. So that's it.

this is how to shot web web hacking and mobile hacking in

字幕與單字

單字即點即查 點擊單字可以查詢單字解釋

B1 中級 美國腔

DEF CON 23 - Jason Haddix - How to Shot Web: Web and mobile hacking in 2015(DEF CON 23 - Jason Haddix - How to Shot Web: Web and mobile hacking in 2015)

  • 9 0
    林宜悉 發佈於 2022 年 05 月 14 日
影片單字