Lecture 8
Lecture 8
information Technology
Department of Information Security
Ethical Hacking
Lecture 8: Hacking Web
Servers and Web
Applications
• DNS Amplification - uses recursive DNS to DoS a target; amplifies DNS answers to target until it
can't do anything. (Botnet)
• Directory Transversal (../ or dot-dot-slash) - requests file that should not be accessible from web
server Example: http://www.example.com/../../../../etc/password
Web Server Attacks
• Parameter Tampering (URL Tampering) (IDOR) manipulating parameters within URL to achieve escalation
or other changes.
• Web Cache Poisoning - replacing the cache on a box with a malicious version of it.
Some of the common web server attack tools include: Metasploit , Mpack , Zeus, Neosplit
Web Server Architecture
Web Application Attacks
• Most often hacked before of inherent weaknesses built into the program
• First step is to identify entry points (POST data, URL parameters, cookies, headers, etc.)
• Tools for Identifying Entry Points
• BurpSuite
• •Tools for Identifying Entry Points BURPSUITE
• Injection
• File Injection - attacker injects a pointer in a web form to an exploit hosted elsewhere
• Command Injection -attacker gains shell access using Java or similar
• SOAP Injection - inject query strings in order to bypass authenticationa
• SOAP uses XML to format information
• Messages are "one way" in nature
• LDAP Injection - exploits applications that construct LDAP statements
• Format for LDAP injection includes
• SQL Injection - injecting SQL commands into input fields to produce output single quote ('), Double dash (--), input "" OR 1=1 “
Web Application Attacks
• Many web application threats exist on a web server. The following are the
most common threats:
• XSS
• Command Execution
• HTTP Brute Force
• Remote File Upload
• SQL Injection
• CSRF
Cross-site Scripting (XSS)