|
Cybersecurity testing often requires making many analyses, at regularly scheduled intervals, to identify a potential exploit. This example illustrates how eValid is applied in one specific way to a web page or web application to search for a pattern that may represent a possible exploit. To apply this method in your specific situation you will need to make decisions about what pages to scan, what specific patterns or features to look for, and how to handle the information that is generated. Web application security requires careful planning and test execution analysis. eValid enables such work. |
Summary Of Example
This example uses eValid to identify an exploitable query type HTML passage.
The example web page contains a form with some exploitable query type HTML elements that reference an OnLoad action.
Example Steps & Explanation
Here are the main steps in this example:
<html> <BODY> <p> <FORM name="QueryForm" METHOD=Post ACTION="./query_output.html"> <br> <table border="0" cellpadding="2" width="614"> <tr> <td colspan="5" width="500"> <b> Please Identify Yourself:</b></td> </tr> <tr> <td width="20"> </td> <td width="35">Name:</td> <td width="200"><INPUT TYPE="text" NAME="name" SIZE="22" MAXLENGTH="50" style="border:1px solid #171787; font-family:verdana,arial,courier; color:#000000;padding:2px;background:#EEEFFF ;">< font color="red"> *</font></td> <td width="35">E-mail:</td> <td width="200"><INPUT TYPE="text" NAME="e-mail" SIZE="18" MAXLENGTH="40" style="border:1px solid #171787; font-family:verdana,arial,courier; color:#000000;padding:2px;background:#EEEFFF ;"> </td> </tr> </table> <p> <INPUT TYPE="submit" NAME="submit" VALUE="Submit Query" style="border:1px solid #171787; font-family:verdana,arial,courier; color:#000000;padding:2px;background:#EEEFFF ;"> </form> </body> </html>
eValid Test Script
Here is the test sript:
# # Copyright 2013 by Software Research, Inc. # Recording made on: Microsoft Windows XP, HostName "barbados-PC" # ProjectID "ProjExample" GroupID "Security" TestID "querytest" LogID "AUTO" ScreenSize 1280 768 FontSize 1 DeleteCache DeleteCookies # Do not suppress modal pop-ups, need to see these evil requests... PlayValue _PS 0 InitLink "http://www.e-valid.com/Products/Documentation.9/Security/" \ "Examples/Query/cyberquerycheck.html" # Fill in form and submit... Wait 3774 InputValue 0 16 "TEXT" "" "name" "Joe Smith" "" "" Wait 3566 InputValue 0 20 "TEXT" "" "e-mail" "joe@abc.com" "" "" Wait 3936 SubmitClick 0 22 "" "submit" "Submit Query" "" NO_NAV # Synchronizing on the response page... SyncOnText 0 "exploit" "" # Seek out any XSS related triggers and record any suspicuous findings... MatchNotString 0 "XSS" 0 "" SaveRecord Queryfile.txt "Date/Time: \t%T" SaveRecord Queryfile.txt " on page: \tURL=$_StartURL" # Notifications/alerts...tell the user about the problem... # # OnErrorSendFile "email-address" "subject" "Queryfile" # End of script.
References