Web application security - the fast guide 1.1 | Page 120
Chapter 6 - Attack execution (2)
P a g e | 120
Authorization the process of giving someone permission to do or have something
it defines how access is controlled in the context of what is access by whom.
In authorization we can talk about three types of authorities:
1- Vertical authority: it is about the level of access to specific functionality
set for each type of users an example is the difference in authority
between administrator and a normal user.
2- Horizontal authority: this type of authority is about controlling the access
in the same functionality, as example having the authority to access the
web mail functionality does not mean ability to access any email account.
3- Contextual authority: this type of authority is related to current
application state which can be explained in the perspective of multistage
process where available functionalities are specified according to present
state.
attacking those concentrate accordingly on breaking the access control using
three methods:
Vertical privilege escalation: The focus in this method is to gain higher
level of access related to more privileged type of users.
Horizontal privileges escalation: tries to compromise resources to
which he is not entitled. For example, in web mail application to read
other people’s e-mail
Business logic exploitation tries to exploit a flaw in the application’s
state machine to have access to an important resource. For example, a
user may be able to bypass the payment step in a shopping checkout
sequence.
Attack requirement:
A. Different privileges to different users on functionalities
B. Different privileges to different users on resources.
C. Privileged user used functionalities are in the same application containing
configuration and motoring it
Attack Process:
A. Configure Burp as a proxy and disable interception, browse all the
application’s content within one user context. If the target is to test
vertical access controls higher privileges account should be used.
B. Be sure to map all functionalities by checking Burp’s site map.
C. use the context menu to select the “compare site maps” feature.
D. To select the second site map to be compared, you can either load this
from a Burp state file or have Burp dynamically re-request the first site
map in a new session context.
E. To test horizontal access controls between users of the same type, you
can
simply
load
a
state
file
you
saved
earlier,