WebApp Sec mailing list archives
Re: Parameter fuzzing and forced browsing
From: mikeiscool <michaelslists () gmail com>
Date: Thu, 10 Aug 2006 09:55:22 +1000
On 9 Aug 2006 14:26:59 -0000, indianwhitehathacker () yahoo com <indianwhitehathacker () yahoo com> wrote:
I was going through the OWASP Top Ten Guide and I came across these terms:- 1. Parameter fuzzing 2. Forced browsing What are these? Is forced browsing something like an attempt to access a resource that I am not supposed to access by putting the direct link with the necessary parameter values in a hope that may be in that page the authentication is broken? Also, I read about fuzzers. Can someone throw light on what are fuzzers?
come on now, searching can give you all the answers... but fuzzing is the process if sending in random data and seeing if the app crashes. the data be close to real data (a little fuzzy) or not close to real data at all (very fuzz). 'forced browsing' would, i guess, refer to the act of making the victims browser visit a page they didn't intend. done via some xss or even header injection into a badly santised 'redirect'. but i'd think the OWASP Guide itself may document these things. maybe not. i'm sure the appropriate person will comment at the suggestion it doesn't, though :) -- mic ------------------------------------------------------------------------- Sponsored by: WatchfireWatchfire was recently named the worldwide market leader in Web application security assessment tools by both Gartner and IDC. Download a free trial of AppScan today and see why more customers choose AppScan then any other solution. Try it today! https://www.watchfire.com/securearea/appscancamp.aspx?id=701500000008VnB
--------------------------------------------------------------------------
Current thread:
- Parameter fuzzing and forced browsing indianwhitehathacker (Aug 09)
- Re: Parameter fuzzing and forced browsing mikeiscool (Aug 09)
- Re: Parameter fuzzing and forced browsing Ryan Barnett (Aug 10)
- Re: Parameter fuzzing and forced browsing mikeiscool (Aug 09)