Information disclosure
by frankheat
Fuzzing
- Add payload positions to parameters and use pre-built wordlists
of fuzz strings to test a high volume of different inputs in quick
succession.
- Use grep matching rules to quickly identify occurrences of
keywords, such as error, invalid, SELECT, SQL, and so on.
- Files for web crawlers
- Developer comments
- Error messages
- These can provide information about different technologies ->
documented exploits
- Check whether there are any configuration errors or dangerous
default settings that you may be able to exploit
- Debugging data
- Debugging information may sometimes be logged in a separate
file
- User account pages
- Source code disclosure via backup files
- Text editors often generate temporary backup files while the
original file is being edited
- appending a tilde (
~) to the filename
/upload/code.php~,
/upload/~code.php
- adding a different file extension
- Information disclosure due to insecure configuration
- Example
HTTP TRACE. This can sometimes lead to
disclosing information, like internal authentication headers added
by reverse proxies.
- Version control history