{"id":513285,"date":"2010-04-04T16:07:00","date_gmt":"2010-04-04T20:07:00","guid":{"rendered":"tag:blogger.com,1999:blog-7196788127833928948.post-8045096545142228588"},"modified":"2010-04-04T16:07:00","modified_gmt":"2010-04-04T20:07:00","slug":"fuzzing-with-owasps-jbrofuzz","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/513285","title":{"rendered":"Fuzzing with OWASP&#8217;s JBroFuzz"},"content":{"rendered":"<p>I decided to search out a good web fuzzer for some testing needs. I  wanted a fuzzer that was capable, customizable and could support my  testing.  The last thing I wanted was some sort of all-in-one  application security scanner (since the false positives can just get  ridiculous at times). Nope, all I needed was some automation assistance.<\/p>\n<p>First thing a simple definitio: <span style=\"font-weight: bold;\">Fuzzing <\/span>or <span style=\"font-weight: bold;\">Fuzz testing<\/span> is a software testing technique that provides invalid, unexpected, or random data to the inputs of a program. If the program fails (for example, by crashing or failing built-in code assertions), the defects can be noted.<\/p>\n<p>I came across <a href=\"http:\/\/www.owasp.org\/\">OWASP&#8217;s<\/a> <a href=\"http:\/\/www.owasp.org\/index.php\/Category:OWASP_JBroFuzz\">JBroFuzz<\/a>  and think I&#8217;ve found a good match.  The tool provides a variety of  brute force options and includes some nice graphing and statistics to  analyze the information. I was also happy to see some nice <a href=\"http:\/\/www.owasp.org\/index.php\/OWASP_JBroFuzz_Tutorial#JBroFuzz_Basic_Functionality\">documentation<\/a>  so I could quickly get up and running. My only compliant at the moment  is that the proxy setup is a little clunky and not-intuitive at first.  But again, as long as you follow the <a href=\"http:\/\/www.owasp.org\/index.php\/OWASP_JBroFuzz_Tutorial#Using_JBroFuzz_with_a_Generic_Proxy\">guide<\/a>,  it shouldn&#8217;t be an issue.<\/p>\n<div class=\"separator\" style=\"clear: both; text-align: center;\"><a href=\"http:\/\/www.owasp.org\/images\/thumb\/e\/ea\/JBroFuzz-ScreenShot.png\/300px-JBroFuzz-ScreenShot.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"><img decoding=\"async\" src=\"http:\/\/www.owasp.org\/images\/thumb\/e\/ea\/JBroFuzz-ScreenShot.png\/300px-JBroFuzz-ScreenShot.png\" border=\"0\" \/><\/a><\/div>\n<p>When do I plan to use this new found fuzzer?<br \/>1. Sites where I don&#8217;t have source for some reason. This is actually a  rarity. If you want someone to assess the security of your web app, you  should really give them the source code. Quick aside: if the consultants  you select for an assessment aren&#8217;t asking for source code, an alarm  should go off in your head. If they don&#8217;t do source code analysis, then  they aren&#8217;t doing there job.<\/p>\n<p>2. When a site relies heavily on complex regular expressions for input  validation and has weak output encoding. Yes, we can make the argument  straight away that this is an issue. But its very powerful to make your  case with a working exploit. Otherwise, you are trying to justify a bug  fix to an issue that may or may not be currently exploitable. This can  be a tough sell if developers are heavily leveraged with feature  enhancements, new functionality, upcoming releases, etc.<\/p>\n<p>This is a guest post by Michael Coates, a senior application security  consultant with extensive experience in application security, security  code review and penetration assessments. He has conducted numerous  security assessments for financial, enterprise and cellular customers  world-wide.<br \/>The original text is published on<a href=\"http:\/\/michael-coates.blogspot.com\/\"> &#8230;Application Security&#8230;<\/a><\/p>\n<p>Talkback and comments are most welcome<\/p>\n<p>Related posts<br \/><a href=\"http:\/\/www.shortinfosec.net\/2010\/03\/skipfish-new-web-security-tool-from.html\">Skipfish  &#8211; New Web Security Tool from Google<\/a><br \/><a href=\"http:\/\/www.shortinfosec.net\/2008\/07\/tutorial-using-ratproxy-for-analysis.html\">Tutorial  &#8211; Using Ratproxy for Web Site Vulnerability Analysis<\/a><br \/><a href=\"http:\/\/www.shortinfosec.net\/2009\/11\/how-to-malicious-web-site-analysis.html\">How  To &#8211; Malicious Web SIte Analysis Environment<\/a><br \/><a href=\"http:\/\/www.shortinfosec.net\/2008\/02\/having-web-site-that-is-not-that-easy.html\">Web  Site that is not that easy to hack &#8211; Part 1 HOWTO &#8211; the bare  necessities<\/a><br \/><a href=\"http:\/\/www.shortinfosec.net\/2008\/12\/checking-web-site-security-quick.html\">Checking  web site security &#8211; the quick approach<\/a><\/p>\n<div class=\"blogger-post-footer\"><img width='1' height='1' src='https:\/\/blogger.googleusercontent.com\/tracker\/7196788127833928948-8045096545142228588?l=www.shortinfosec.net' alt='' \/><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/shortinfosec\/~4\/_Tbv0DAU-Qs\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I decided to search out a good web fuzzer for some testing needs. I wanted a fuzzer that was capable, customizable and could support my testing. The last thing I wanted was some sort of all-in-one application security scanner (since the false positives can just get ridiculous at times). Nope, all I needed was some [&hellip;]<\/p>\n","protected":false},"author":5679,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-513285","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/513285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/5679"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=513285"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/513285\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=513285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=513285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=513285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}