\n
It wouldn't be uncommon for developers to block/filter characters like <, >, and maybe even /.
\nSo as an attacker, you encode it, converting those characters to their hex values of 3C, 3E, and 2F, respectively.
\nYour payload looks something like this:
\nSeems reasonable.
\nExcept developers have gotten wise to this. Their buddies have told them on StackOverflow that they should always URL decode input coming from the user.
\nAnd this is where double encoding comes in. You can further obfuscate the payload by encoding the % sign itself, which has a hex value of 25.
\nYour final malicious payload ends up looking like this:
\nSo the next time you find an API rejecting your payload with some sort of input validation filter, try to double-encode it.
\nAnd don't forget, you can use the Burp Suite Decoder to help with this...
\nπ James Kettle has shared the Top 10 web hacking techniques of 2023. This is PortSwigger's annual community-powered effort to identify the most innovative must-read web security research published in the last year. My favorite is Exploiting Hardened .NET Deserialization, but I am a bit biased.
\nπ οΈ Have you checked out the Spectral OWASP API Security Ruleset? It can scan an OpenAPI document and detect security issues automatically for you, mapped to the common vulnerabilities defined in the OWASP API Security Top 10.
\nπ I read an interesting article from Galeal Zino, in which he believes APIs are like snowflakes. They are each unique. The result is that many API attacks are effectively zero-day attacksβnovel attacks that exploit recent and unique changes to specific APIs. His answer? Make public APIs private. Can't say that will matter... we will still find them. π
\nπ€¦ The Register reports that Fortinet's FortiSIEM product is vulnerable to two maximum-severity security vulnerabilities that allow for remote code execution, or at least according to two freshly published CVEs. It appears some newly found OS Command injection vulnerabilities exist in their APIs.
\nπ It was interesting to read about how the head of the NSA's Tailored Access Operation (TAO) was at a conference explaining how to keep him and his crew out of our systems. Its unusual for people in TAO to be talking publicly... albeit a lot of their laundry was already aired out by Snowden.
\nπ§ There have been a bunch of additions and updates to the MindAPI mind map worth checking out. Curious about what's new? Check out the commit history in GitHub.
\n㪠There is a great playlist called Everything API Hacking on YouTube that's worth checking out. It's basically a collection of all of InsiderPHD's vids focused on API hacking.
\nπ Have you ever read Inon Shkedy's 31days of API Security Tips? Some wise (yet easy to consume) API security tips are there for you to consume.
\nπ€ Here are some interesting API hacking pentips stored in a Gitbook. It's basically a brain dump of the notes taking while learning to hack APIs by CSbyGB.
\nWell, that's it for this monthly review. March madness is here. Earlier I mentioned that 2024 is just flying by.
\nI asked ChatGPT what it thought \"time flies\" meant. It drew this for me...
\nAI is getting crazy cool and creative these days.
\nTalk to you in the next newsletter!
\nHack hard!
Dana
\n |
| \n\n |
|
Helping developers, testers, and hackers improve their approach to appsec and find vulnerabilities in their apps and APIs before their adversaries do. Interested to know more? Subscribe to my newsletter below!
Hey friend π, Wow. It sure felt like we fell into fall pretty fast. Say that three times fast. π π With September behind us, its time to look back and review what has been done. Before I do that though, remember in last week's newsletter when I mentioned the NSA's new podcast called No Such Podcast? A few of you sent me notes that you loved learning about it. Some of you have already listened to all of the episodes. But I've got something better for you. I've recently been reading Code...
Hey friend π, Well, I said I was talking most of August off. And I did. So this month in review doesn't include a lot of new articles. But lots of stuff did happen. First, we moved into our new oceanfront villa. That's been a game changer. I haven't had such long and deep sleeps in years. It's so calm and quiet here. And, who doesn't want a home office view like this? ππ» It gave me lots of time to just sit, think, and read. In fact, I read a fascinating book on that deck in just a couple of...
Hey friend π, Summer is in full swing. Sunburns are in full effect. Wild fires are fully engulfing our forests. And the hottest thing yet... the latest Deadpool movie finally hit theatres. I get it. You probably have been really busy in July. I know I was. Five articles. Three presentations. And one research paper that included a new custom Burp extension that I'm not allowed to talk about. (Ya, it's that dark. And pure Kotlin code). Speaking of "dark", I read a really interesting book in...