WebApp Sec mailing list archives

Re: Website "Scanner"


From: Todd Charron <tcharron () mnsi net>
Date: 09 Jan 2003 10:03:56 -0500

Slightly off topic, but i'm not seeing what would be illegal about a
tool such as that?  It seems that he's just looking to generate a list
of publically available files.  Surely this is no different than the
indexing done by a search engine?  Now what he does with that
information may not be on the up and up but that's a separate matter.  I
can't see how this is any different than indexing or port scanning,
things that occur daily without malicious or criminal intent.

Todd

On Wed, 2003-01-08 at 20:51, Nelson Sampaio Araujo Junior wrote:
Well,

That sounds you're not doing something legal with it. If you are the owner
of the server/system, just dir or list them. Another hint is that if the
administrator has disabled the Index option, its probably because you can't
do it (legally speaking).

- Nelson

----- Original Message -----
From: <backed.up.by.2048.bit.encryption () hushmail com>
To: <sullo () cirt net>
Cc: <webappsec () securityfocus com>; <vuln-dev () securityfocus com>
Sent: Wednesday, January 08, 2003 3:22 PM
Subject: Re: Website "Scanner"



-----BEGIN PGP SIGNED MESSAGE-----



On Wed, 08 Jan 2003 14:21:16 -0800 sullo () cirt net wrote:

2) take all the files an mix them with all the directories from
the scan
database, so that:
 /dir1/file1.html
 /dir2/file2.html
 /dir3/file3.html
turns into requests for
 /dir1/file1.html
 /dir1/file2.html
 /dir1/file3.html
 /dir2/file1.html
 /dir2/file2.html
 /dir2/file3.html
 /dir3/file1.html
 /dir3/file2.html
 /dir3/file3.html



Yes, this is more the idea.  We are not looking for vulns. or xploits,
rather trying to intelligently "guess" what else is in that directory.
Either through dictionary use or other use. For example the following is
publicly accessible:

http://www.microsoft.com/new_products/bigwinner2003.html

We want to find out what else might be in "new_products" so we plug in say
the words "big" "winner" "2003" and let our dictionary spin:

 biggerwinner2003.html - nothing
 bigloser2002.html - hit

etc.

Combining the dictionary and words from a specific site or files visible
publicly, we try to guess the names of whatever else might be in that
directory.

You can do this manually with small time sites and obvious file names e.g.
index1.html...index2.html etc. Even annualreport2002.html is visible, try
annualreport.2003.html

You can guess and hit on files that are not intended for public
consumption.

If it can be automated with user input for obvious keywords, you probably
could strike many interesting and sensitive files in the directory.

-----BEGIN PGP SIGNATURE-----
Version: Hush 2.2 (Java)
Note: This signature can be verified at https://www.hushtools.com/verify

wnUEARECADUFAj4csi8uHGJhY2tlZC51cC5ieS4yMDQ4LmJpdC5lbmNyeXB0aW9uQGh1
c2htYWlsLmNvbQAKCRDEHQGvBp4eRGE4AJ4joBLhRlZYcBX7sxnOmgYPfbtYOgCfUFun
Y0PA+csb++5g+pM+c/0Bkok=
=SFPk
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Big $$$ to be made with the HushMail Affiliate Program:
https://www.hushmail.com/about.php?subloc=affiliate&l=427





Current thread: