Dark Mode
Capec-85 Detail
AJAX Footprinting
Detailed Software Likelihood: High Typical Severity: Low
Parents: 580
Threats: T60 T65 T80 T258 T288 T291 T302 T334 T392 T407
Tools: 18
This attack utilizes the frequent client-server roundtrips in Ajax conversation to scan a system. While Ajax does not open up new vulnerabilities per se, it does optimize them from an attacker point of view. A common first step for an attacker is to footprint the target environment to understand what attacks will work. Since footprinting relies on enumeration, the conversational pattern of rapid, multiple requests and responses that are typical in Ajax applications enable an attacker to look for many vulnerabilities, well-known ports, network locations and so on. The knowledge gained through Ajax fingerprinting can be used to support other attacks, such as XSS.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-85 | capec | https://capec.mitre.org/data/definitions/85.html | |
| CWE-79 | cwe | http://cwe.mitre.org/data/definitions/79.html | |
| CWE-113 | cwe | http://cwe.mitre.org/data/definitions/113.html | |
| CWE-348 | cwe | http://cwe.mitre.org/data/definitions/348.html | |
| CWE-96 | cwe | http://cwe.mitre.org/data/definitions/96.html | |
| CWE-20 | cwe | http://cwe.mitre.org/data/definitions/20.html | |
| CWE-116 | cwe | http://cwe.mitre.org/data/definitions/116.html | |
| CWE-184 | cwe | http://cwe.mitre.org/data/definitions/184.html | |
| CWE-86 | cwe | http://cwe.mitre.org/data/definitions/86.html | |
| CWE-692 | cwe | http://cwe.mitre.org/data/definitions/692.html | |
| REF-539 | reference_from_CAPEC | https://www.helpnetsecurity.com/dl/articles/Ajax_fingerprinting.pdf | Shreeraj Shah, Ajax fingerprinting for Web 2.0 Applications, Help Net Security |
Explore
-
Send request to target webpage and analyze HTML: Using a browser or an automated tool, an adversary sends requests to a webpage and records the received HTML response. Adversaries then analyze the HTML to identify any known underlying JavaScript architectures. This can aid in mappiong publicly known vulnerabilities to the webpage and can also helpo the adversary guess application architecture and the inner workings of a system.
| Techniques |
|---|
| Record all "src" values inside script tags. These JavaScript files are compared to lists of files for known architectures. If there is a large match between the "src" values and architecture files, then it can be assumed that particular architecture is being used. |
- The user must allow JavaScript to execute in their browser
- None: No specialized resources are required to execute this type of attack.
| Medium |
|---|
| To land and launch a script on victim's machine with appropriate footprinting logic for enumerating services and vulnerabilities in JavaScript |
| Confidentiality |
|---|
| Read Data |
- Footprinting can be executed over almost any protocol including HTTP, TCP, UDP, and ICMP, with the general goal of gaining further information about a host environment to launch further attacks. The attacker can probe the system for banners, vulnerabilities, filenames, available services, and in short anything the host process has access to. The results of the probe are either used to execute javascript (for example, if the attackers' footprint script identifies a vulnerability in a firewall permission, then the client side script executes a javascript to change client firewall settings, or an attacker may simply echo the results of the scan back out to a remote host for targeting future attacks) or to inform other data gathering activities in order to craft atta.