Andres, DM,
I will setup ASAP an IRC client (I have never used IRC before) and I will
come back to you with a date (Luxembourg time) when I'm able to connect to
#w3af channel...
Regards,
Dom
--
Cordialement, Best regards,
Dominique Righetto
dominique.righe...@gmail.com
dominique.righe...@owasp.o
Hi,
Thanks you for your response.
For sure, we can work together on this subject in order to better
understand the attack context and how to test it.
I have read the links below in order to have an overview of an attack on
"host" header.
-
http://www.skeletonscribe.net/2013/05/practical-http-ho
Dom,
Lets do something, lets schedule it. I'm GMT-3 and during this
week I don't have any fixed appointments yet. If you tell me a
reasonable hour (given my timezone and that I work from 8:30 to
7:30pm) we can schedule a 2h block and join the #w3af channel on IRC
to work on the integer overflo
Dom,
I was planning on working on the host header plugin. I did have a similar
response from the mailing list, which is understandable see everyone is very
busy.
Maybe you and I can work on this further to get a better idea of how it will
work?
On Mon, Jul 29, 2013 at 8:24 AM, Andres Rianc
Dom,
On Fri, Jul 26, 2013 at 4:41 PM, Dominique Righetto
wrote:
> Hi,
>
> I have spend the 2 last week trying to understand how to detect and how to
> reproduce the integer overflow, unfortunately I wasn't able to fully
> understand both of them.
I feel bad that I / we were unable to help you wi
Hi,
I have spend the 2 last week trying to understand how to detect and how to
reproduce the integer overflow, unfortunately I wasn't able to fully
understand both of them.
I will take another ticket: "HTTP Host header attacks - Audit plugin" if
it's available ?
Dom
--
Cordialement, Best regard
And if Tomas shares his code, that would be nice too :D
On Mon, Jul 15, 2013 at 11:49 AM, Dominique Righetto
wrote:
> Hi,
>
> Thanks you. I will use your feedback to understand and find the
> vulnerability detection methods.
>
> Best regards,
> Dom
>
> --
> Cordialement, Best regards,
> Dominique
Hi,
Thanks you. I will use your feedback to understand and find the
vulnerability detection methods.
Best regards,
Dom
--
Cordialement, Best regards,
Dominique Righetto
dominique.righe...@gmail.com
dominique.righe...@owasp.org
Twitter: @righettod
GPG: 0x323D19BA
http://www.righettod.eu
"No trees
On Sun, Jul 14, 2013 at 4:49 AM, Dominique RIGHETTO
wrote:
> Hi Tomas,
>
> Thanks you very much.
>
> I try to understand the objective of each of the value in
> ["-012345", "-2147483649", "-2147483648", "012345", "2147483647",
> "2147483648", "4294967295", "4294967296", "023456"].
>
>
On Sat, Jul 13, 2013 at 10:48 AM, Tomas Velazquez
wrote:
> Hi Dominique,
>
> Months ago I code a poc of integer overflow, but it is unfinished.
Well, then you guys should work together on it :)
> My code is based on skipfish detection:
> http://code.google.com/p/skipfish/source/browse/trunk/src/
The xss [0] plugin is a good example for what you're trying to
achieve. The interesting parts are:
fake_mutants = create_mutants(freq, ['',])
Where you create mutants (modified http requests) based on a fuzzable
request (which is the result of the crawling phase) with a "fake"
value of an emp
Hi Tomas,
Thanks you very much.
I try to understand the objective of each of the value in
["-012345", "-2147483649", "-2147483648", "012345",
"2147483647", "2147483648", "4294967295", "4294967296", "023456"].
For values: 2147483647,2147483648,-2147483649,-2147483648
I understand bec
Hi Dominique,
Months ago I code a poc of integer overflow, but it is unfinished.
My code is based on skipfish detection:
http://code.google.com/p/skipfish/source/browse/trunk/src/checks.c
Regards,
On Sat, Jul 13, 2013 at 10:09 AM, Dominique Righetto <
dominique.righe...@gmail.com> wrote:
> H
Hi Andres,
I'm working on integer overflow detection plugin and I try to understand,
in a audit plugin, how to access to injection points detected by in
discovery part.
Can you give me some pointer or plugin example ?
Thanks in advance
Dom
---
14 matches
Mail list logo