Главная
Study mode:
on
1
Intro
2
About me
3
Outline
4
Issues with typical scanners
5
Writing the code
6
Why the code
7
Crosssite scripting
8
Password reset
9
Cache poisoning
10
Cache poisoning attack
11
Host header poisoning
12
Testing for cache poisoning
13
DNS Rebinding
14
DNS Pinning
15
Burp
16
Relative links
17
Directory traversal vulnerability
18
Use a payload
19
Problems
20
Breaking
21
HTTP responses
22
Regular expressions
23
Conclusion
Description:
Explore advanced web application security techniques in this 39-minute conference talk from AppSecEU 2014. Dive into ActiveScan++, an open-source Python plugin for Burp Suite that enhances active scanning capabilities. Learn how to identify complex vulnerabilities in real-world applications, including host header poisoning, relative path overwrites, and code injection. Discover the mechanics behind these attacks, automated detection methods, and exploitation techniques. Gain insights into current research on detecting suspicious behavior using platform-independent payload sets and fuzzy pattern matching. Witness the first public release of this open-source tool and understand its potential to revolutionize automated vulnerability hunting in web security testing.

Active Scan Augmenting Manual Testing with Attack Proxy Plugins

OWASP Foundation
Add to list
0:00 / 0:00