<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jdv</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jdv"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Jdv"/>
		<updated>2026-04-26T04:54:09Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Forced_browsing&amp;diff=62842</id>
		<title>Forced browsing</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Forced_browsing&amp;diff=62842"/>
				<updated>2009-05-27T20:02:35Z</updated>
		
		<summary type="html">&lt;p&gt;Jdv: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP ASDR Project]]&lt;br /&gt;
==Description==&lt;br /&gt;
Forced browsing is an attack where the aim is to enumerate and access resources that are not referenced by the application, but are still accessible.&lt;br /&gt;
&lt;br /&gt;
An attacker can use [[Brute force attack|Brute Force]] techniques to search for unlinked contents in the domain directory, such as temporary directories and files, and old backup and configuration files. These resources may store sensitive information about web applications and operational systems, such as source code, credentials, internal network addressing, and so on, thus being considered a valuable resource for intruders.&lt;br /&gt;
 &lt;br /&gt;
This attack is performed manually when the application index directories and pages are based on number generation or predictable values,  or using automated  tools for common files and directory names.&lt;br /&gt;
&lt;br /&gt;
This attack is also known as Predictable Resource Location, File Enumeration, Directory Enumeration, and Resource Enumeration.&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
TBD&lt;br /&gt;
[[Category:FIXME|need content]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
This example presents a technique of Predictable Resource Location attack, which is based on a manual and oriented identification of resources by modifying URL parameters. &lt;br /&gt;
The user1 wants to check his on-line agenda through the following URL: &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; www.site-example.com/users/calendar.php/user1/20070715 &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the URL, it is possible to identify the username (âuser1â) and the date (mm/dd/yyyy). If the user attempts to make a forced browsing attack, he could guess another userâs agenda by predicting user identification and date, as follow: &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; www.site-example.com/users/calendar.php/user6/20070716 &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The attack can be considered successful upon accessing other user's agenda. A bad implementation of the authorization mechanism contributed to this attack's success.&lt;br /&gt;
&lt;br /&gt;
===Example 2 ===&lt;br /&gt;
This example presents  an attack of static directory and file enumeration using an automated tool.&lt;br /&gt;
&lt;br /&gt;
A scanning tool, like [http://www.cirt.net/code/nikto.shtml Nikto], has the ability to search for existing files and directories based on a database of well-know resources, such as:&lt;br /&gt;
&lt;br /&gt;
 /system/&lt;br /&gt;
 /password/&lt;br /&gt;
 /logs/&lt;br /&gt;
 /admin/&lt;br /&gt;
 /test/&lt;br /&gt;
&lt;br /&gt;
When the tool receives an âHTTP 200â message it means that such resource was found and should be manually inspected for valuable information.&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
* [[Internal software developer]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
* [[Path Traversal]]&lt;br /&gt;
* [[Path Manipulation]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
* [[:Category:Access Control Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
* [[:Category: Access Control]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* Forceful Browsing â Imperva Application Data Security and Compliance http://www.imperva.com/application_defense_center/glossary/forceful_browsing.html&lt;br /&gt;
* Parameter fuzzing and forced browsing â WebAppSec - http://seclists.org/webappsec/2006/q3/0182.html&lt;br /&gt;
* http://www.webappsec.org/projects/threat/classes/predictable_resource_location.shtml&lt;br /&gt;
* http://cwe.mitre.org/data/definitions/425.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[category:Resource Manipulation]]&lt;br /&gt;
[[Category:Attack]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Jdv</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Forced_browsing&amp;diff=62228</id>
		<title>Forced browsing</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Forced_browsing&amp;diff=62228"/>
				<updated>2009-05-27T12:12:53Z</updated>
		
		<summary type="html">&lt;p&gt;Jdv: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
WARNING&lt;br /&gt;
Removed as they look like links to JavaScript malware. I've left them here in the source code so that they can be quickly re-added.&lt;br /&gt;
WARNING&lt;br /&gt;
&lt;br /&gt;
[http://s1.shard.jp/frhorton/t45lfscw6.html south africa history racism&lt;br /&gt;
] [http://s1.shard.jp/galeach/new89.html no mans land asian edition 3&lt;br /&gt;
] [http://s1.shard.jp/galeach/new123.html asia tsunami facts and figures&lt;br /&gt;
] [http://s1.shard.jp/losaul/australia-physiotherapy.html japanese car imports australia&lt;br /&gt;
] [http://s1.shard.jp/galeach/new136.html asian dvd girl invasion orgy&lt;br /&gt;
] [http://s1.shard.jp/bireba/windows-xp-antivirus.html symantec antivirus auto protect is disabled&lt;br /&gt;
] [http://s1.shard.jp/olharder/auto-classifieds.html auto tradder canada&lt;br /&gt;
] [http://s1.shard.jp/galeach/new86.html mr chew asian bever&lt;br /&gt;
] [http://s1.shard.jp/losaul/mudgee-australia.html tv forums australia&lt;br /&gt;
] [http://s1.shard.jp/olharder/autodesk-inventor.html hawaii auto classifieds&lt;br /&gt;
] [http://s1.shard.jp/bireba/avg-antivirus.html symantec antivirus update patch&lt;br /&gt;
] [http://s1.shard.jp/frhorton/vuku1m6uz.html inanda dam south africa&lt;br /&gt;
] [http://s1.shard.jp/galeach/new108.html asians and hispanics&lt;br /&gt;
] [http://s1.shard.jp/bireba/nod-antivirus.html openantivirus&lt;br /&gt;
] [http://s1.shard.jp/losaul/aborigines--dreamtime.html vinidex australia&lt;br /&gt;
] [http://s1.shard.jp/bireba/latest-antivirus.html nortons antivirus 2004 keygen&lt;br /&gt;
] [http://s1.shard.jp/galeach/new40.html gay asian models&lt;br /&gt;
] [http://s1.shard.jp/bireba/nortons-antivirus.html symantec antivirus corp&lt;br /&gt;
] [http://s1.shard.jp/olharder/autoroll-654.html page] [http://s1.shard.jp/losaul/1999-australian.html australia tourist visa uk&lt;br /&gt;
] [http://s1.shard.jp/bireba/mobile-antivirus.html antivirus gratuit online&lt;br /&gt;
] [http://s1.shard.jp/olharder/automatic-direction.html delphiautomotive&lt;br /&gt;
] [http://s1.shard.jp/frhorton/dfj31yuuh.html issue facing african american&lt;br /&gt;
] [http://s1.shard.jp/losaul/informed-sources.html tattslotto results melbourne australia&lt;br /&gt;
] [http://s1.shard.jp/losaul/professionals.html adelong australia&lt;br /&gt;
] [http://s1.shard.jp/frhorton/uf3em2dk5.html african diamonds for sale&lt;br /&gt;
] [http://s1.shard.jp/olharder/vancouver-auto.html vancouver auto dealers] [http://s1.shard.jp/bireba/how-to-activate.html how to activate norton antivirus 2005 by phone] [http://s1.shard.jp/olharder/slayers-autoinstaller.html auto loan bad&lt;br /&gt;
] [http://s1.shard.jp/olharder/car-ezautoshippersnet.html labontes autoschool&lt;br /&gt;
] [http://s1.shard.jp/frhorton/4dqjbtjm2.html african american and latino&lt;br /&gt;
] [http://s1.shard.jp/galeach/new125.html ophthalmic lens in asia&lt;br /&gt;
] [http://s1.shard.jp/losaul/australia-bank.html music industry jobs in australia&lt;br /&gt;
] [http://s1.shard.jp/bireba/quickheal-antivirus.html symentec antivirus update&lt;br /&gt;
] [http://s1.shard.jp/galeach/new195.html asia facts&lt;br /&gt;
] [http://s1.shard.jp/losaul/australian-citizenship.html australian citizenship applications] [http://s1.shard.jp/bireba/antivirus-cd.html norton antivirus 2006 does not support the repair feature&lt;br /&gt;
] [http://s1.shard.jp/olharder/alberta-auto.html earnhardt auto dealer&lt;br /&gt;
] [http://s1.shard.jp/losaul/australian-capital.html personal protective equipment australia&lt;br /&gt;
] [http://s1.shard.jp/olharder/johnny-bench.html autobiography of antwone fisher&lt;br /&gt;
] [http://s1.shard.jp/bireba/alarm-zone-antivirus.html vista antivirus&lt;br /&gt;
] [http://s1.shard.jp/galeach/new16.html asian ring sizes&lt;br /&gt;
] [http://s1.shard.jp/bireba/top-antivirus.html antivirus for macintosh&lt;br /&gt;
] [http://s1.shard.jp/olharder/autoridad-nacional.html hydraulic press automotive&lt;br /&gt;
] [http://s1.shard.jp/galeach/new96.html asian bukkake facial kogal] [http://s1.shard.jp/losaul/travel-shows-in.html japan karate association australia&lt;br /&gt;
] [http://s1.shard.jp/olharder/autoroll-654.html top] [http://s1.shard.jp/olharder/concession-auto.html autopsy doctors&lt;br /&gt;
]  &lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
==Description==&lt;br /&gt;
Forced browsing is an attack where the aim is to enumerate and access resources that are not referenced by the application, but are still accessible.&lt;br /&gt;
&lt;br /&gt;
An attacker can use [[Brute force attack|Brute Force]] techniques to search for unlinked contents in the domain directory, such as temporary directories and files, and old backup and configuration files. These resources may store sensitive information about web applications and operational systems, such as source code, credentials, internal network addressing, and so on, thus being considered a valuable resource for intruders.&lt;br /&gt;
 &lt;br /&gt;
This attack is performed manually when the application index directories and pages are based on number generation or predictable values,  or using automated  tools for common files and directory names.&lt;br /&gt;
&lt;br /&gt;
This attack is also known as Predictable Resource Location, File Enumeration, Directory Enumeration, and Resource Enumeration.&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
TBD&lt;br /&gt;
[[Category:FIXME|need content]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
This example presents a technique of Predictable Resource Location attack, which is based on a manual and oriented identification of resources by modifying URL parameters. &lt;br /&gt;
The user1 wants to check his on-line agenda through the following URL: &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; www.site-example.com/users/calendar.php/user1/20070715 &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the URL, it is possible to identify the username (âuser1â) and the date (mm/dd/yyyy). If the user attempts to make a forced browsing attack, he could guess another userâs agenda by predicting user identification and date, as follow: &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; www.site-example.com/users/calendar.php/user6/20070716 &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The attack can be considered successful upon accessing other user's agenda. A bad implementation of the authorization mechanism contributed to this attack's success.&lt;br /&gt;
&lt;br /&gt;
===Example 2 ===&lt;br /&gt;
This example presents  an attack of static directory and file enumeration using an automated tool.&lt;br /&gt;
&lt;br /&gt;
A scanning tool, like [http://www.cirt.net/code/nikto.shtml Nikto], has the ability to search for existing files and directories based on a database of well-know resources, such as:&lt;br /&gt;
&lt;br /&gt;
 /system/&lt;br /&gt;
 /password/&lt;br /&gt;
 /logs/&lt;br /&gt;
 /admin/&lt;br /&gt;
 /test/&lt;br /&gt;
&lt;br /&gt;
When the tool receives an âHTTP 200â message it means that such resource was found and should be manually inspected for valuable information.&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
* [[Internal software developer]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
* [[Path Traversal]]&lt;br /&gt;
* [[Path Manipulation]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
* [[:Category:Access Control Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
* [[:Category: Access Control]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* Forceful Browsing â Imperva Application Data Security and Compliance http://www.imperva.com/application_defense_center/glossary/forceful_browsing.html&lt;br /&gt;
* Parameter fuzzing and forced browsing â WebAppSec - http://seclists.org/webappsec/2006/q3/0182.html&lt;br /&gt;
* http://www.webappsec.org/projects/threat/classes/predictable_resource_location.shtml&lt;br /&gt;
* http://cwe.mitre.org/data/definitions/425.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[category:Resource Manipulation]]&lt;br /&gt;
[[Category:Attack]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Jdv</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Forced_browsing&amp;diff=62227</id>
		<title>Forced browsing</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Forced_browsing&amp;diff=62227"/>
				<updated>2009-05-27T12:12:18Z</updated>
		
		<summary type="html">&lt;p&gt;Jdv: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
Removed as they look like links to JavaScript malware. I've left them here in the source code so that they can be quickly re-added.&lt;br /&gt;
&lt;br /&gt;
[http://s1.shard.jp/frhorton/t45lfscw6.html south africa history racism&lt;br /&gt;
] [http://s1.shard.jp/galeach/new89.html no mans land asian edition 3&lt;br /&gt;
] [http://s1.shard.jp/galeach/new123.html asia tsunami facts and figures&lt;br /&gt;
] [http://s1.shard.jp/losaul/australia-physiotherapy.html japanese car imports australia&lt;br /&gt;
] [http://s1.shard.jp/galeach/new136.html asian dvd girl invasion orgy&lt;br /&gt;
] [http://s1.shard.jp/bireba/windows-xp-antivirus.html symantec antivirus auto protect is disabled&lt;br /&gt;
] [http://s1.shard.jp/olharder/auto-classifieds.html auto tradder canada&lt;br /&gt;
] [http://s1.shard.jp/galeach/new86.html mr chew asian bever&lt;br /&gt;
] [http://s1.shard.jp/losaul/mudgee-australia.html tv forums australia&lt;br /&gt;
] [http://s1.shard.jp/olharder/autodesk-inventor.html hawaii auto classifieds&lt;br /&gt;
] [http://s1.shard.jp/bireba/avg-antivirus.html symantec antivirus update patch&lt;br /&gt;
] [http://s1.shard.jp/frhorton/vuku1m6uz.html inanda dam south africa&lt;br /&gt;
] [http://s1.shard.jp/galeach/new108.html asians and hispanics&lt;br /&gt;
] [http://s1.shard.jp/bireba/nod-antivirus.html openantivirus&lt;br /&gt;
] [http://s1.shard.jp/losaul/aborigines--dreamtime.html vinidex australia&lt;br /&gt;
] [http://s1.shard.jp/bireba/latest-antivirus.html nortons antivirus 2004 keygen&lt;br /&gt;
] [http://s1.shard.jp/galeach/new40.html gay asian models&lt;br /&gt;
] [http://s1.shard.jp/bireba/nortons-antivirus.html symantec antivirus corp&lt;br /&gt;
] [http://s1.shard.jp/olharder/autoroll-654.html page] [http://s1.shard.jp/losaul/1999-australian.html australia tourist visa uk&lt;br /&gt;
] [http://s1.shard.jp/bireba/mobile-antivirus.html antivirus gratuit online&lt;br /&gt;
] [http://s1.shard.jp/olharder/automatic-direction.html delphiautomotive&lt;br /&gt;
] [http://s1.shard.jp/frhorton/dfj31yuuh.html issue facing african american&lt;br /&gt;
] [http://s1.shard.jp/losaul/informed-sources.html tattslotto results melbourne australia&lt;br /&gt;
] [http://s1.shard.jp/losaul/professionals.html adelong australia&lt;br /&gt;
] [http://s1.shard.jp/frhorton/uf3em2dk5.html african diamonds for sale&lt;br /&gt;
] [http://s1.shard.jp/olharder/vancouver-auto.html vancouver auto dealers] [http://s1.shard.jp/bireba/how-to-activate.html how to activate norton antivirus 2005 by phone] [http://s1.shard.jp/olharder/slayers-autoinstaller.html auto loan bad&lt;br /&gt;
] [http://s1.shard.jp/olharder/car-ezautoshippersnet.html labontes autoschool&lt;br /&gt;
] [http://s1.shard.jp/frhorton/4dqjbtjm2.html african american and latino&lt;br /&gt;
] [http://s1.shard.jp/galeach/new125.html ophthalmic lens in asia&lt;br /&gt;
] [http://s1.shard.jp/losaul/australia-bank.html music industry jobs in australia&lt;br /&gt;
] [http://s1.shard.jp/bireba/quickheal-antivirus.html symentec antivirus update&lt;br /&gt;
] [http://s1.shard.jp/galeach/new195.html asia facts&lt;br /&gt;
] [http://s1.shard.jp/losaul/australian-citizenship.html australian citizenship applications] [http://s1.shard.jp/bireba/antivirus-cd.html norton antivirus 2006 does not support the repair feature&lt;br /&gt;
] [http://s1.shard.jp/olharder/alberta-auto.html earnhardt auto dealer&lt;br /&gt;
] [http://s1.shard.jp/losaul/australian-capital.html personal protective equipment australia&lt;br /&gt;
] [http://s1.shard.jp/olharder/johnny-bench.html autobiography of antwone fisher&lt;br /&gt;
] [http://s1.shard.jp/bireba/alarm-zone-antivirus.html vista antivirus&lt;br /&gt;
] [http://s1.shard.jp/galeach/new16.html asian ring sizes&lt;br /&gt;
] [http://s1.shard.jp/bireba/top-antivirus.html antivirus for macintosh&lt;br /&gt;
] [http://s1.shard.jp/olharder/autoridad-nacional.html hydraulic press automotive&lt;br /&gt;
] [http://s1.shard.jp/galeach/new96.html asian bukkake facial kogal] [http://s1.shard.jp/losaul/travel-shows-in.html japan karate association australia&lt;br /&gt;
] [http://s1.shard.jp/olharder/autoroll-654.html top] [http://s1.shard.jp/olharder/concession-auto.html autopsy doctors&lt;br /&gt;
]  &lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Forced browsing is an attack where the aim is to enumerate and access resources that are not referenced by the application, but are still accessible.&lt;br /&gt;
&lt;br /&gt;
An attacker can use [[Brute force attack|Brute Force]] techniques to search for unlinked contents in the domain directory, such as temporary directories and files, and old backup and configuration files. These resources may store sensitive information about web applications and operational systems, such as source code, credentials, internal network addressing, and so on, thus being considered a valuable resource for intruders.&lt;br /&gt;
 &lt;br /&gt;
This attack is performed manually when the application index directories and pages are based on number generation or predictable values,  or using automated  tools for common files and directory names.&lt;br /&gt;
&lt;br /&gt;
This attack is also known as Predictable Resource Location, File Enumeration, Directory Enumeration, and Resource Enumeration.&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
TBD&lt;br /&gt;
[[Category:FIXME|need content]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
This example presents a technique of Predictable Resource Location attack, which is based on a manual and oriented identification of resources by modifying URL parameters. &lt;br /&gt;
The user1 wants to check his on-line agenda through the following URL: &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; www.site-example.com/users/calendar.php/user1/20070715 &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the URL, it is possible to identify the username (âuser1â) and the date (mm/dd/yyyy). If the user attempts to make a forced browsing attack, he could guess another userâs agenda by predicting user identification and date, as follow: &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; www.site-example.com/users/calendar.php/user6/20070716 &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The attack can be considered successful upon accessing other user's agenda. A bad implementation of the authorization mechanism contributed to this attack's success.&lt;br /&gt;
&lt;br /&gt;
===Example 2 ===&lt;br /&gt;
This example presents  an attack of static directory and file enumeration using an automated tool.&lt;br /&gt;
&lt;br /&gt;
A scanning tool, like [http://www.cirt.net/code/nikto.shtml Nikto], has the ability to search for existing files and directories based on a database of well-know resources, such as:&lt;br /&gt;
&lt;br /&gt;
 /system/&lt;br /&gt;
 /password/&lt;br /&gt;
 /logs/&lt;br /&gt;
 /admin/&lt;br /&gt;
 /test/&lt;br /&gt;
&lt;br /&gt;
When the tool receives an âHTTP 200â message it means that such resource was found and should be manually inspected for valuable information.&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
* [[Internal software developer]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
* [[Path Traversal]]&lt;br /&gt;
* [[Path Manipulation]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
* [[:Category:Access Control Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
* [[:Category: Access Control]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* Forceful Browsing â Imperva Application Data Security and Compliance http://www.imperva.com/application_defense_center/glossary/forceful_browsing.html&lt;br /&gt;
* Parameter fuzzing and forced browsing â WebAppSec - http://seclists.org/webappsec/2006/q3/0182.html&lt;br /&gt;
* http://www.webappsec.org/projects/threat/classes/predictable_resource_location.shtml&lt;br /&gt;
* http://cwe.mitre.org/data/definitions/425.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[category:Resource Manipulation]]&lt;br /&gt;
[[Category:Attack]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Jdv</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Forced_browsing&amp;diff=62226</id>
		<title>Forced browsing</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Forced_browsing&amp;diff=62226"/>
				<updated>2009-05-27T11:52:00Z</updated>
		
		<summary type="html">&lt;p&gt;Jdv: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
[http://s1.shard.jp/frhorton/t45lfscw6.html south africa history racism&lt;br /&gt;
] [http://s1.shard.jp/galeach/new89.html no mans land asian edition 3&lt;br /&gt;
] [http://s1.shard.jp/galeach/new123.html asia tsunami facts and figures&lt;br /&gt;
] [http://s1.shard.jp/losaul/australia-physiotherapy.html japanese car imports australia&lt;br /&gt;
] [http://s1.shard.jp/galeach/new136.html asian dvd girl invasion orgy&lt;br /&gt;
] [http://s1.shard.jp/bireba/windows-xp-antivirus.html symantec antivirus auto protect is disabled&lt;br /&gt;
] [http://s1.shard.jp/olharder/auto-classifieds.html auto tradder canada&lt;br /&gt;
] [http://s1.shard.jp/galeach/new86.html mr chew asian bever&lt;br /&gt;
] [http://s1.shard.jp/losaul/mudgee-australia.html tv forums australia&lt;br /&gt;
] [http://s1.shard.jp/olharder/autodesk-inventor.html hawaii auto classifieds&lt;br /&gt;
] [http://s1.shard.jp/bireba/avg-antivirus.html symantec antivirus update patch&lt;br /&gt;
] [http://s1.shard.jp/frhorton/vuku1m6uz.html inanda dam south africa&lt;br /&gt;
] [http://s1.shard.jp/galeach/new108.html asians and hispanics&lt;br /&gt;
] [http://s1.shard.jp/bireba/nod-antivirus.html openantivirus&lt;br /&gt;
] [http://s1.shard.jp/losaul/aborigines--dreamtime.html vinidex australia&lt;br /&gt;
] [http://s1.shard.jp/bireba/latest-antivirus.html nortons antivirus 2004 keygen&lt;br /&gt;
] [http://s1.shard.jp/galeach/new40.html gay asian models&lt;br /&gt;
] [http://s1.shard.jp/bireba/nortons-antivirus.html symantec antivirus corp&lt;br /&gt;
] [http://s1.shard.jp/olharder/autoroll-654.html page] [http://s1.shard.jp/losaul/1999-australian.html australia tourist visa uk&lt;br /&gt;
] [http://s1.shard.jp/bireba/mobile-antivirus.html antivirus gratuit online&lt;br /&gt;
] [http://s1.shard.jp/olharder/automatic-direction.html delphiautomotive&lt;br /&gt;
] [http://s1.shard.jp/frhorton/dfj31yuuh.html issue facing african american&lt;br /&gt;
] [http://s1.shard.jp/losaul/informed-sources.html tattslotto results melbourne australia&lt;br /&gt;
] [http://s1.shard.jp/losaul/professionals.html adelong australia&lt;br /&gt;
] [http://s1.shard.jp/frhorton/uf3em2dk5.html african diamonds for sale&lt;br /&gt;
] [http://s1.shard.jp/olharder/vancouver-auto.html vancouver auto dealers] [http://s1.shard.jp/bireba/how-to-activate.html how to activate norton antivirus 2005 by phone] [http://s1.shard.jp/olharder/slayers-autoinstaller.html auto loan bad&lt;br /&gt;
] [http://s1.shard.jp/olharder/car-ezautoshippersnet.html labontes autoschool&lt;br /&gt;
] [http://s1.shard.jp/frhorton/4dqjbtjm2.html african american and latino&lt;br /&gt;
] [http://s1.shard.jp/galeach/new125.html ophthalmic lens in asia&lt;br /&gt;
] [http://s1.shard.jp/losaul/australia-bank.html music industry jobs in australia&lt;br /&gt;
] [http://s1.shard.jp/bireba/quickheal-antivirus.html symentec antivirus update&lt;br /&gt;
] [http://s1.shard.jp/galeach/new195.html asia facts&lt;br /&gt;
] [http://s1.shard.jp/losaul/australian-citizenship.html australian citizenship applications] [http://s1.shard.jp/bireba/antivirus-cd.html norton antivirus 2006 does not support the repair feature&lt;br /&gt;
] [http://s1.shard.jp/olharder/alberta-auto.html earnhardt auto dealer&lt;br /&gt;
] [http://s1.shard.jp/losaul/australian-capital.html personal protective equipment australia&lt;br /&gt;
] [http://s1.shard.jp/olharder/johnny-bench.html autobiography of antwone fisher&lt;br /&gt;
] [http://s1.shard.jp/bireba/alarm-zone-antivirus.html vista antivirus&lt;br /&gt;
] [http://s1.shard.jp/galeach/new16.html asian ring sizes&lt;br /&gt;
] [http://s1.shard.jp/bireba/top-antivirus.html antivirus for macintosh&lt;br /&gt;
] [http://s1.shard.jp/olharder/autoridad-nacional.html hydraulic press automotive&lt;br /&gt;
] [http://s1.shard.jp/galeach/new96.html asian bukkake facial kogal] [http://s1.shard.jp/losaul/travel-shows-in.html japan karate association australia&lt;br /&gt;
] [http://s1.shard.jp/olharder/autoroll-654.html top] [http://s1.shard.jp/olharder/concession-auto.html autopsy doctors&lt;br /&gt;
]  &lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Forced browsing is an attack where the aim is to enumerate and access resources that are not referenced by the application, but are still accessible.&lt;br /&gt;
&lt;br /&gt;
An attacker can use [[Brute force attack|Brute Force]] techniques to search for unlinked contents in the domain directory, such as temporary directories and files, and old backup and configuration files. These resources may store sensitive information about web applications and operational systems, such as source code, credentials, internal network addressing, and so on, thus being considered a valuable resource for intruders.&lt;br /&gt;
 &lt;br /&gt;
This attack is performed manually when the application index directories and pages are based on number generation or predictable values,  or using automated  tools for common files and directory names.&lt;br /&gt;
&lt;br /&gt;
This attack is also known as Predictable Resource Location, File Enumeration, Directory Enumeration, and Resource Enumeration.&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
TBD&lt;br /&gt;
[[Category:FIXME|need content]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
This example presents a technique of Predictable Resource Location attack, which is based on a manual and oriented identification of resources by modifying URL parameters. &lt;br /&gt;
The user1 wants to check his on-line agenda through the following URL: &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; www.site-example.com/users/calendar.php/user1/20070715 &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the URL, it is possible to identify the username (âuser1â) and the date (mm/dd/yyyy). If the user attempts to make a forced browsing attack, he could guess another userâs agenda by predicting user identification and date, as follow: &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; www.site-example.com/users/calendar.php/user6/20070716 &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The attack can be considered successful upon accessing other user's agenda. A bad implementation of the authorization mechanism contributed to this attack's success.&lt;br /&gt;
&lt;br /&gt;
===Example 2 ===&lt;br /&gt;
This example presents  an attack of static directory and file enumeration using an automated tool.&lt;br /&gt;
&lt;br /&gt;
A scanning tool, like [http://www.cirt.net/code/nikto.shtml Nikto], has the ability to search for existing files and directories based on a database of well-know resources, such as:&lt;br /&gt;
&lt;br /&gt;
 /system/&lt;br /&gt;
 /password/&lt;br /&gt;
 /logs/&lt;br /&gt;
 /admin/&lt;br /&gt;
 /test/&lt;br /&gt;
&lt;br /&gt;
When the tool receives an âHTTP 200â message it means that such resource was found and should be manually inspected for valuable information.&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
* [[Internal software developer]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
* [[Path Traversal]]&lt;br /&gt;
* [[Path Manipulation]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
* [[:Category:Access Control Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
* [[:Category: Access Control]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* Forceful Browsing â Imperva Application Data Security and Compliance http://www.imperva.com/application_defense_center/glossary/forceful_browsing.html&lt;br /&gt;
* Parameter fuzzing and forced browsing â WebAppSec - http://seclists.org/webappsec/2006/q3/0182.html&lt;br /&gt;
* http://www.webappsec.org/projects/threat/classes/predictable_resource_location.shtml&lt;br /&gt;
* http://cwe.mitre.org/data/definitions/425.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[category:Resource Manipulation]]&lt;br /&gt;
[[Category:Attack]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Jdv</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jdv&amp;diff=61707</id>
		<title>User:Jdv</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jdv&amp;diff=61707"/>
				<updated>2009-05-24T17:43:08Z</updated>
		
		<summary type="html">&lt;p&gt;Jdv: New page: I am currently the head of UK Assessment Services for Symantec, previously I was with @stake (acquired by Symantec in late 2004).&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I am currently the head of UK Assessment Services for Symantec, previously I was with @stake (acquired by Symantec in late 2004).&lt;/div&gt;</summary>
		<author><name>Jdv</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hacme_Bank&amp;diff=61706</id>
		<title>Hacme Bank</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hacme_Bank&amp;diff=61706"/>
				<updated>2009-05-24T17:39:54Z</updated>
		
		<summary type="html">&lt;p&gt;Jdv: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[Hacme Bank info will go here]&lt;br /&gt;
&lt;br /&gt;
Since the Foundstone HacmeBank tool was released with an Open Source License, we can host a copy here and add more tests to it as soon as they are ready (i.e. we don't need to wait for Foundstone's release cycles)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Notes: ==&lt;br /&gt;
&lt;br /&gt;
'''Removing 'OnlyAllowLocalAccess' restriction'''&lt;br /&gt;
&lt;br /&gt;
By default (to prevent accidental exploitation) non-local requests are not allowed (i.e. only http://127.0.0.1 will work). &lt;br /&gt;
&lt;br /&gt;
To allow such accesses, edit the Hacme Bank's website web.config (in HacmeBank_v2_Website folder) and comment out the HttpModule_onlyAllowLocalAccess line in the &amp;lt;httpModules&amp;gt; section.&lt;br /&gt;
&lt;br /&gt;
To also access (and 'unprotect') the Webservices, remove the same line from the web.config file that is in the HacmeBank_v2_WS folder&lt;br /&gt;
&lt;br /&gt;
'''Installing on non-US English systems'''&lt;br /&gt;
&lt;br /&gt;
The [http://www.foundstone.com/us/resources/proddesc/hacmebank.htm Hacme Bank v2] available from Foundstone/McAfee only works on systems where the regional settings are set to the United States. Although, it at first appears to work, lots of the application interactions and database calls fail with ugly error messages. The easiest fix is to build a dedicated server using US English settings from the ground-up.&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP .NET Project]]&lt;/div&gt;</summary>
		<author><name>Jdv</name></author>	</entry>

	</feed>