Skip to content

Feature/how to detect #26

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion 2019/en/src/0xa1-broken-object-level-authorization.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ modify other users' account data.

## How to Detect

Access control weaknesses are best detected by **manual** means. **Code review**
Access control weaknesses are best detected by **manual** means. By simply searching for variables such as UserID's and account numbers that could possibly be ennumerated or URL paths that can be manipulated. **Code review**
and **pentesting** are a great way to detect these issues. Some automation may
be used to detect the absence of access controls.

Expand Down
2 changes: 1 addition & 1 deletion 2019/en/src/0xa2-broken-authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@ within a few minutes.

**Code review** will help to identify authentication issues. **Automated tests**
are useful to test the implementation against automated attacks such as
brute-force and credential stuffing.
brute-force and credential stuffing. **Manual tests** will help to identify this issue, by sniffing the traffic and understanding the authentication/authorization workflows. Another method is checking for tokens which can be used to authenticate into the API, JWT tokens are commonly used but can also be easily decrypted, so in reverse we can encypt a JWT token with enumerated information to access the API.

## References

Expand Down
2 changes: 1 addition & 1 deletion 2019/en/src/0xa3-excessive-data-exposure.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ the site.

## How to Detect

Excessive data exposure is better detected by **manual** means. Mock data can be
Excessive data exposure is best detected by **manual** means, by simply scanning the responses from the API and looking for any sensitive information or variables that can be enumerated. Mock data can be
used to automate some testing.

## References
Expand Down
5 changes: 2 additions & 3 deletions 2019/en/src/0xa4-lack-of-resources-and-rate-limiting.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,9 +57,8 @@ errors.

## How to Detect

Typically it requires **automated tools** to simulate high workloads.
**Scanners** usually provide such features, highlighting the lack of resources
and rate limiting. Scanners are commonly used during **pentesting**.
**Scanners** usually provide features to simulate large workloads, highlighting the lack of resources
and rate limiting built in, but this can also be found through automated tools that, similar to scanners, lest the pentester generate large customs workloads to overwhelm the API. Scanners are commonly used during **pentesting**.

## References

Expand Down