paros~ web测试工具

最近乱七八糟的研究都跟web安全有关。所以今天来整理一下。 简单介绍一些工具:

 

PAROS

 

这个工具用来测试web应用的。使用比较简单:

1、先把你的IE设置为回环;

     具体步骤为 工具->Internet选项->连接->局域网设置->设置代理服务器->高级->HTTP设置为127.0.0.1,端口80

2、打开paros

     我用的是paros-3.2.13-win。安装过程就是一路回车。

          

3、手动打开IE

     paros会遍历web的目录。在每个目录上右键,可以看到spider命令。点这个命令,遍历更深的目录。

4、扫描

     paros的analyse里面有scan,或者你可以选scan all,对paros建立的site进行扫描。最后会生成一个htm格式的日志。

    

 

Paros Scanning Report

Report generated at Thu, 24 Dec 2009 12:36:47.

Summary of Alerts

Risk LevelNumber of Alerts
High1
Medium2
Low1
Informational0

 

 

Alert Detail

 

High (Warning)SQL Injection

Description

SQL injection is possible. User parameters submitted will be formulated into a SQL query for database processing. If the query is built by simple 'string concatenation', it is possible to modify the meaning of the query by carefully crafting the parameters. Depending on the access right and type of database used, tampered query can be used to retrieve sensitive information from the database or execute arbitrary code. MS SQL and PostGreSQL, which supports multiple statements, may be exploited if the database access right is more powerful.

This can occur in URL query strings, POST paramters or even cookies. Currently check on cookie is not supported by Paros. You should check SQL injection manually as well as some blind SQL injection areas cannot be discovered by this check.

 
URL
 
Parameter
action=“后面屏蔽 霍霍”
 

Solution

Do not trust client side input even if there is client side validation. In general,

  • If the input string is numeric, type check it.
  • If the application used JDBC, use PreparedStatement or CallableStatement with parameters passed by '?'
  • If the application used ASP, use ADO Command Objects with strong type checking and parameterized query.
  • If stored procedure or bind variables can be used, use it for parameter passing into query. Do not just concatenate string into query in the stored procedure!
  • Do not create dynamic SQL query by simple string concatentation.
  • Use minimum database user privilege for the application. This does not eliminate SQL injection but minimize its damage. Eg if the application require reading one table only, grant such access to the application. Avoid using 'sa' or 'db-owner'.

 

Reference

 

  • The OWASP guide at http://www.owasp.org/documentation/guide
  • http://www.sqlsecurity.com/DesktopDefault.aspx?tabid=23
  • http://www.spidynamics.com/whitepapers/WhitepaperSQLInjection.pdf
  • For Oracle database, refer to http://www.integrigy.com/info/IntegrigyIntrotoSQLInjectionAttacks.pdf

 

 

Medium (Warning)Cross site scripting

Description

Cross-site scripting or HTML injection is possible. Malicious script may be injected into the browser which appeared to be genuine content from the original site. These scripts can be used to execute arbitrary code or steal customer sensitive information such as user password or cookies.

Very often this is in the form of a hyperlink with the injected script embeded in the query strings. However, XSS is possible via FORM POST data, cookies, user data sent from another user or shared data retrieved from database.

Currently this check does not verify XSS from cookie or database. They should be checked manually if the application retrieve database records from another user's input.

 
URL
 
Parameter
UserInfoForSearch.“屏蔽屏蔽屏蔽”
 
URL
 
Parameter
UserInfoForSearch..“屏蔽屏蔽屏蔽”
 
URL
 
Parameter
UserInfoForSearch..“屏蔽屏蔽屏蔽”
 
URL
 
Parameter
UserInfoForSearch..“屏蔽屏蔽屏蔽”
 
URL
 
Parameter
UserInfoForSearch..“屏蔽屏蔽屏蔽”
 
URL
 
Parameter
UserInfoForSearch..“屏蔽屏蔽屏蔽”
 
URL
 
Parameter
UserInfoForSearch..“屏蔽屏蔽屏蔽”
 
URL
 
Parameter
UserInfoForSearch..“屏蔽屏蔽屏蔽”
 
URL
 
Parameter
UserInfoForSearch..“屏蔽屏蔽屏蔽”
 
URL
 
Parameter
UserInfoForSearch..“屏蔽屏蔽屏蔽”
 
URL
 
Parameter
UserInfoForSearch..“屏蔽屏蔽屏蔽”
 

Solution

Do not trust client side input even if there is client side validation. Sanitize potentially danger characters in the server side. Very often filtering the <, >, " characters prevented injected script to be executed in most cases. However, sometimes other danger meta-characters such as ' , (, ), /, &, ; etc are also needed.

In addition (or if these characters are needed), HTML encode meta-characters in the response. For example, encode < as &lt;

 

Reference

 

  • The OWASP guide at http://www.owasp.org/documentation/guide
  • http://www.technicalinfo.net/papers/CSS.html
  • http://www.cgisecurity.org/articles/xss-faq.shtml
  • http://www.cert.org/tech_tips/malicious_code_FAQ.html
  • http://sandsprite.com/Sleuth/papers/RealWorld_XSS_1.html

 

 

Medium (Suspicious)IBM WebSphere default files

Description

IBM WebSphere 4.0/5.0 example files are found.

 
URL
 
 

Solution

Remove example files.

Reference

 

 

Low (Warning)Private IP disclosure

Description

Private IP such as x.x.x.x, x.x.x.x, 192.168.x.x is found in the HTTP response body. This can be used in exploits on internal system.

 
URL
 
Other information
 
 
URL
 
Other information
 
 
URL
 
Other information
 

Solution

Remove the private IP address from the HTTP response body. For comments, use jsp/asp comment instead of HTML/javascript comment which can be seen by client browsers.

Reference

 

 

额哈哈,好像屏蔽的太多了~,不过总之生成的日志大概就是这个样子得。

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值