Web application security - the fast guide 1.1 | Page 71
Chapter 4 - Be the attacker
P a g e | 71
As part of mapping infrastructure it is important to identify any mediators like
virtual servers, load balancer, proxies or firewalls because the existence of such
components in the targeted victim environment might derive totally different
attack approach.
The following examples explain main practices used to identify such
intermediaries:
Detecting load balancers:
- Surrounding IP scan
- Detecting unsynchronized time stamp
- detecting different (last modified or Etag) header for the same resource
- Existence of unusual cookies.
- Different SSL certificate
Detecting Proxies:
- Using Trace command that echo the exact request and detect changes.
- Standard connect test
- Standard proxy request
4.8 Mapping Application
F1
F2
F3
F4
Application
To Map the application functionality, contents and workflow attacker can use
many methods and apply it through different tools.
4.8.1 Mapping functionalities and contents:
Web application crawling:
using special software that automate the generation of http requests
attacker can capture the returned results and recursively auto extract