Application Layer Fuzzing
Attacker’s approach
• Fuzzing over HTTP
• Injecting faults with various set of payload
• Try to raise the exception
• Exception throw message back as part of HTTP
response
• Scanning response for signatures
• If signature found, it becomes interesting
entry for exploitation
Possible Leaks
• Errors can send information about technology stack and
weaknesses. In some cases error helps in fingerprinting web
and application servers running on target application.
• Internal IP addresses and architecture layout for network.
• Intranet applications and their setups.
• Type of backend database and its connection information.
• Internal folders and file system layout for application.
• Username and authentication mechanism and disclosures.
• Hidden paths and folder which helps in retrieving several
other files and internal database information.
• Error code and other relevant information which helps in
analyzing possible cause for an attacker.
Root cause
• Deployment cause – Application runs on technology stack,
it involves web server, application servers, plugins and
handlers, database server etc. If these components are not
configured properly or having inherent vulnerability then it
can lead to information disclosure.
• Source code cause – If application source code is not having
best practices for error or exception handling then it ends
up leaking information to end client as part of business
logic. This set of information can help in detecting
vulnerability or end up sharing internal logic information.
Error handlers
Web Server
Application Server
Source Code
Database/Auth/Backend
HTTP
Request
HTTP
Response
Error
Messages
File not found errors
• HTTP 404 - not found
server id
server id
Internal server errors
• HTTP 500 error messages:
nature of
error
revealed
in error
code
PHP error example
• Attempting to read a file which does not exist:
Internal path
disclosed.
Application error message example
• Attempting to place an order that already
exists:
Internal path
disclosed.
MySQL error example
• Generated from a failed PHP MySQL query:
Possible SQL
injection point
uncovered.
MS-SQL error example
• Generated from a failed ASP MS-SQL query:
Possible SQL
injection point
uncovered.
Tools & Conclusion

More Related Content

PPT
Assessment methodology and approach
PPT
AppSec 2007 - .NET Web Services Hacking
PPT
Advanced applications-architecture-threats
PPTX
Application Security TRENDS – Lessons Learnt- Firosh Ummer
PDF
Mobile security chess board - attacks & defense
PPT
Secure SDLC for Software
PPT
Web Services Hacking and Security
PDF
CSRF, ClickJacking & Open Redirect
Assessment methodology and approach
AppSec 2007 - .NET Web Services Hacking
Advanced applications-architecture-threats
Application Security TRENDS – Lessons Learnt- Firosh Ummer
Mobile security chess board - attacks & defense
Secure SDLC for Software
Web Services Hacking and Security
CSRF, ClickJacking & Open Redirect

What's hot (20)

PPT
Hacking web applications
PPT
HTML5 hacking
PPTX
Owasp Top 10 A1: Injection
PDF
Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2)
PPT
Automation In Android & iOS Application Review
DOC
Joomla web application development vulnerabilities
PDF
HTML5 Top 10 Threats - Silent Attacks and Stealth Exploits
PPTX
Web application attacks
PPT
FIND ME IF YOU CAN – SMART FUZZING AND DISCOVERY
PDF
Workshop : Application Security
PDF
Hacking Ajax & Web Services - Next Generation Web Attacks on the Rise
PPT
XSS and CSRF with HTML5
PDF
CNIT 129S: Ch 5: Bypassing Client-Side Controls
PPTX
Website hacking and prevention (All Tools,Topics & Technique )
PDF
Securty Testing For RESTful Applications
PDF
Session7-XSS & CSRF
PPTX
Owasp first5 presentation
PDF
CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)
PDF
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
PPT
Web Attacks - Top threats - 2010
Hacking web applications
HTML5 hacking
Owasp Top 10 A1: Injection
Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2)
Automation In Android & iOS Application Review
Joomla web application development vulnerabilities
HTML5 Top 10 Threats - Silent Attacks and Stealth Exploits
Web application attacks
FIND ME IF YOU CAN – SMART FUZZING AND DISCOVERY
Workshop : Application Security
Hacking Ajax & Web Services - Next Generation Web Attacks on the Rise
XSS and CSRF with HTML5
CNIT 129S: Ch 5: Bypassing Client-Side Controls
Website hacking and prevention (All Tools,Topics & Technique )
Securty Testing For RESTful Applications
Session7-XSS & CSRF
Owasp first5 presentation
CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
Web Attacks - Top threats - 2010
Ad

Viewers also liked (7)

PPTX
Security Testing: Fuzzing
PPTX
Intro to reverse engineering owasp
PPTX
Reverse engineering
PPTX
Register Organization and Instruction cycle
PPTX
Processor organization & register organization
PPTX
What the fuzz
PDF
Assembly language 8086
Security Testing: Fuzzing
Intro to reverse engineering owasp
Reverse engineering
Register Organization and Instruction cycle
Processor organization & register organization
What the fuzz
Assembly language 8086
Ad

Similar to Application fuzzing (20)

PDF
Injecting simplicity not SQL RSA Europe 2010
PDF
Web Security
KEY
OWASP Dallas
PPT
Web Application Security
PPTX
Security hole #5 application security science or quality assurance
PPT
Software Security in the Real World
PDF
Injecting simplicity not SQL BSides Las Vegas 2010
PPTX
Altitude SF 2017: Security at the edge
PPTX
Securing the Web @RivieraDev2016
PPTX
Web Application Hacking tools .pptx
PPTX
Chapter 2Chapter 2Chapter 2Chapter 2Chapter 2
PDF
Code securely
PPTX
CyberSecurityppt. pptx
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
PDF
Graphing for Security
PPT
Software Security Engineering
PPTX
Phi 235 social media security users guide presentation
PDF
Vulnerability Management In An Application Security World
PPTX
Web Application Security 101
PDF
Web Application Security with PHP
Injecting simplicity not SQL RSA Europe 2010
Web Security
OWASP Dallas
Web Application Security
Security hole #5 application security science or quality assurance
Software Security in the Real World
Injecting simplicity not SQL BSides Las Vegas 2010
Altitude SF 2017: Security at the edge
Securing the Web @RivieraDev2016
Web Application Hacking tools .pptx
Chapter 2Chapter 2Chapter 2Chapter 2Chapter 2
Code securely
CyberSecurityppt. pptx
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Graphing for Security
Software Security Engineering
Phi 235 social media security users guide presentation
Vulnerability Management In An Application Security World
Web Application Security 101
Web Application Security with PHP

More from Blueinfy Solutions (14)

PDF
Mobile Application Scan and Testing
PPT
Mobile code mining for discovery and exploits nullcongoa2013
PPT
iOS Application Security Testing
PPT
Html5 on mobile
PPT
Android secure coding
PPT
Android attacks
PPT
Source Code Analysis with SAST
PPT
XSS - Attacks & Defense
PPT
Defending against Injections
PPT
XPATH, LDAP and Path Traversal Injection
PPT
Blind SQL Injection
PPT
SQL injection basics
PPT
Applciation footprinting, discovery and enumeration
PPT
HTTP protocol and Streams Security
Mobile Application Scan and Testing
Mobile code mining for discovery and exploits nullcongoa2013
iOS Application Security Testing
Html5 on mobile
Android secure coding
Android attacks
Source Code Analysis with SAST
XSS - Attacks & Defense
Defending against Injections
XPATH, LDAP and Path Traversal Injection
Blind SQL Injection
SQL injection basics
Applciation footprinting, discovery and enumeration
HTTP protocol and Streams Security

Recently uploaded (20)

PDF
August Patch Tuesday
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Tartificialntelligence_presentation.pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
WOOl fibre morphology and structure.pdf for textiles
August Patch Tuesday
Group 1 Presentation -Planning and Decision Making .pptx
NewMind AI Weekly Chronicles – August ’25 Week III
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Unlock new opportunities with location data.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
Enhancing emotion recognition model for a student engagement use case through...
sustainability-14-14877-v2.pddhzftheheeeee
A review of recent deep learning applications in wood surface defect identifi...
Final SEM Unit 1 for mit wpu at pune .pptx
observCloud-Native Containerability and monitoring.pptx
Developing a website for English-speaking practice to English as a foreign la...
Tartificialntelligence_presentation.pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
CloudStack 4.21: First Look Webinar slides
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
WOOl fibre morphology and structure.pdf for textiles

Application fuzzing

  • 2. Attacker’s approach • Fuzzing over HTTP • Injecting faults with various set of payload • Try to raise the exception • Exception throw message back as part of HTTP response • Scanning response for signatures • If signature found, it becomes interesting entry for exploitation
  • 3. Possible Leaks • Errors can send information about technology stack and weaknesses. In some cases error helps in fingerprinting web and application servers running on target application. • Internal IP addresses and architecture layout for network. • Intranet applications and their setups. • Type of backend database and its connection information. • Internal folders and file system layout for application. • Username and authentication mechanism and disclosures. • Hidden paths and folder which helps in retrieving several other files and internal database information. • Error code and other relevant information which helps in analyzing possible cause for an attacker.
  • 4. Root cause • Deployment cause – Application runs on technology stack, it involves web server, application servers, plugins and handlers, database server etc. If these components are not configured properly or having inherent vulnerability then it can lead to information disclosure. • Source code cause – If application source code is not having best practices for error or exception handling then it ends up leaking information to end client as part of business logic. This set of information can help in detecting vulnerability or end up sharing internal logic information.
  • 5. Error handlers Web Server Application Server Source Code Database/Auth/Backend HTTP Request HTTP Response Error Messages
  • 6. File not found errors • HTTP 404 - not found server id server id
  • 7. Internal server errors • HTTP 500 error messages: nature of error revealed in error code
  • 8. PHP error example • Attempting to read a file which does not exist: Internal path disclosed.
  • 9. Application error message example • Attempting to place an order that already exists: Internal path disclosed.
  • 10. MySQL error example • Generated from a failed PHP MySQL query: Possible SQL injection point uncovered.
  • 11. MS-SQL error example • Generated from a failed ASP MS-SQL query: Possible SQL injection point uncovered.