Taras,

On Sun, Nov 15, 2009 at 12:27 PM, Taras <ta...@securityaudit.ru> wrote:
> Andres,
>
>> Yes, a lot of sense to me in the case of the fuzzing, but not that
>> much sense on the side of "finding a vulnerability" trying to send a
>> request with maxlength-1  , maxlength, maxlength+1. Why not sending
>> directly maxlength+whatever and see what happens?
>
> What about complex JavaScript client side checks?
> Such maxlength check can be made on JavaScript.
> And I think in most cases such checks will be on JavaScript because
> simply it more powerful then HTML attributes like maxlength.

Adding support for maxlength field in HTML can be done in 8 hours of
work (at most). Adding support for javascript
parsing/running/analyzing will take 8 days (at least). Which problem
would you prefer to tackle first? ;)

>
> --
> Taras - OSCP, OSWP
> ----
> "Software is like sex: it's better when it's free." - Linus Torvalds
>



-- 
Andrés Riancho
Founder, Bonsai - Information Security
http://www.bonsai-sec.com/
http://w3af.sf.net/

------------------------------------------------------------------------------
Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day 
trial. Simplify your report design, integration and deployment - and focus on 
what you do best, core application coding. Discover what's new with
Crystal Reports now.  http://p.sf.net/sfu/bobj-july
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to