Recon - Server exposure
The first step in the process of attacking a web application is to draw the architecture of the server exposing the application.
Network Utilities
Ping
The hping utility tool can be used to send ICMP, TCP, UDP and raw packets ping:
Traceroute
The traceroute utility tool can be used to map each successive host (remote node) in the route to the target:
If some filters are present in the network path (firewalls, IDS, etc.), then most probably any "unlikely" udp ports (as for default method) or even icmp echoes (as for icmp) are filtered. To bypass a network filter use the TCP probes on TCP services exposed by the server.
Exposed Services
Scan the server for open ports and exposed services:
Further analysis can be conducted against each accessible services.
Intermediate Network Equipments
Detect Load Balancers
Multiples technics can be used to determine the use of a load balancer:
Generate a lot of traffic to trigger a potential load balancer
Check incoherence in datetime as multiple servers may have different internal clock
Inspect HTTP headers and cookies for load balancers known patterns
Check for DNS delegation
The following tools automate the technics above:
Detect Web Application Firewall (WAF)
The WAFW00F utility tool identifies and fingerprints WAF by sending normal and malicious HTTP requests and analyzing the server response:
Last updated