Dark Mode
Capec-215 Detail
Fuzzing for application mapping
Detailed Software Software Likelihood: High Typical Severity: Low
Parents: 28 54
Threats: T60 T65 T290 T291
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-215 | capec | https://capec.mitre.org/data/definitions/215.html | |
| CWE-209 | cwe | http://cwe.mitre.org/data/definitions/209.html | |
| CWE-532 | cwe | http://cwe.mitre.org/data/definitions/532.html |
Explore
-
Observe communication and inputs: The fuzzing adversary observes the target system looking for inputs and communications between modules, subsystems, or systems.
| Techniques |
|---|
| Network sniffing. Using a network sniffer such as wireshark, the adversary observes communications into and out of the target system. |
| Monitor API execution. Using a tool such as ktrace, strace, APISpy, or another debugging tool, the adversary observes the system calls and API calls that are made by the target system, and the nature of their parameters. |
| Observe inputs using web inspection tools (OWASP's WebScarab, Paros, TamperData, TamperIE, etc.) |
Experiment
-
Generate fuzzed inputs: Given a fuzzing tool, a target input or protocol, and limits on time, complexity, and input variety, generate a list of inputs to try. Although fuzzing is random, it is not exhaustive. Parameters like length, composition, and how many variations to try are important to get the most cost-effective impact from the fuzzer.
-
Observe the outcome: Observe the outputs to the inputs fed into the system by fuzzers and see if there are any log or error messages that might provide information to map the application
| Techniques |
|---|
| Boundary cases. Generate fuzz inputs that attack boundary cases of protocol fields, inputs, or other communications limits. Examples include 0xff and 0x00 for single-byte inputs. In binary situations, approach each bit of an individual field with on and off (e.g., 0x80). |
| Attempt arguments to system calls or APIs. The variations include payloads that, if they were successful, could lead to a compromise on the system. |
Exploit
-
Craft exploit payloads: An adversary usually needs to modify the fuzzing parameters according to the observed error messages to get the desired sensitive information for the application. To defeat correlation, the adversary may try changing the origin IP addresses or client browser identification strings or start a new session from where they left off in obfuscating the attack.
| Techniques |
|---|
| Modify the parameters in the fuzzing tool according to the observed error messages. Repeat with enough parameters until the application has been sufficiently mapped. |
| If the application rejects the large amount of fuzzing messages from the same host machine, the adversary needs to hide the attacks by changing the IP addresses or other credentials. |
- The target application must fail to sanitize incoming messages adequately before processing.
- Fuzzing tools, which automatically generate and send message variants, are necessary for this attack. The attacker must have sufficient access to send messages to the target. The attacker must also have the ability to observe the target application's log and/or error messages in order to collect information about the target.
| Medium |
|---|
| Although fuzzing parameters is not difficult, and often possible with automated fuzzing tools, interpreting the error conditions and modifying the parameters so as to move further in the process of mapping the application requires detailed knowledge of target platform, the languages and packages used as well as software design. |
| Confidentiality |
|---|
| Other (Information Leakage) |
- The following code generates an error message that leaks the full pathname of the configuration file. $ConfigDir = "/home/myprog/config";$uname = GetUserInput("username");ExitError("Bad hacker!") if ($uname !~ /^\w+$/);$file = "$ConfigDir/$uname.txt";if (! (-e $file)) { ExitError("Error: $file does not exist"); }... If this code is running on a server, such as a web application, then the person making the request should not know what the full pathname of the configuration directory is. By submitting a username that does not produce a $file that exists, an attacker could get this pathname. It could then be used to exploit path traversal or symbolic link following problems that may exist elsewhere in the application.
- In languages that utilize stack traces, revealing them can give adversaries information that allows them to map functions and file locations for an application. The following Java method prints out a stack trace that exposes the application to this attack pattern. public void httpGet(HttpServletRequest request, HttpServletResponse response) {try {processRequest();} catch (Exception ex) {ex.printStackTrace(response.getWriter()); return;}} If this code is running on a server, such as a web application, then the adversary could cause the exception to be printed through fuzzing.