Web application security - the fast guide 1.1 | Page 75

Chapter 4 - Be the attacker P a g e | 75 If application is using URLs after rewriting parameters as part of the slash separated string a trial to change or remove values should take place with assessment of generated response. For hidden parameters guessing is the only way as example the assessment of the existence of (debug) parameters that helps developer to test pages and bypass the authentication process. 4.10 Documenting your findings: login.php manageAccount.ph ?action=t&id=12 error.php terminateAccount. ?action=s&id=12 showAccount.php ?action=a&id=12 activateAccount.ph Figure 27: Draft diagram illustrating web site structure When trying to map and profile the application you will get a lot of information specially if you are using multiple tools and approaches, organizing your results and deciding which are relevant is very important in order to be able to analyses that information later on. Using matrix and charts can be very helpful. Creating a table on spreadsheet is a good thing to begin with: Page name Path aboutUs.html Login.php /about /login Use SSL? No Yes Static or Dynamic S D Need Auth.? No Yes Used comments method Get Post Also the usage of diagrams that represent the web site is essential to understand different functionalities.it is also preferable to give different color to static and dynamic pages where static pages are those pages that does not involve and server side executable contents like files with html extension. Include the diagram the structure of web site with available passed parameters Other Information that should be documented in addition to pages’ information are Directory structure, common file extension, any content based on plugin like flash or silver lite or java virtual machine like applet, common cookies and query string and parameters.