This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Searching for Code in J2EE/Java
- 1 Performing Text Searches
- 1.1 Searching for code in .NET
- 1.2 Looking for Keywords
- 1.2.1 Form Fields and user Input
- 1.2.2 Query Strings
- 1.2.3 Cookies
- 1.2.4 SQL & Database
- 1.2.5 HTTP Requests
- 1.2.6 HTML Tags
- 1.2.7 web.config settings
- 1.2.8 global.asx
- 1.2.9 Threads and Concurrancy
- 1.2.10 Reflection, Serialization, Clones
- 1.2.11 Crypto
- 1.2.12 Authorization, Assert & Revert
- 1.2.13 Authentication
Performing Text Searches
The basis of the code review is to locate and analyse areas of code which may have application security implications. Assuming the code reviewer has a thorough understanding of the code, what it is intended to do and the context upon which it is to be used, firstly one needs to sweep the code base for areas of interest.
This can be done by performing a text search on the code base looking for keywords relating to API's and functions. Below is a guide for .NET framework 1.1 & 2.0
Searching for code in .NET
Firstly one needs to be familiar with the tools one can use in order to perform text searching following on from this one need to know what to look for.
In this section we will assume you have a copy of Visual Studio (VS) .NET at hand. VS has two types of search "Find in Files" and a cmd line tool called Findstr
The test search tools in XP is not great in my experience and if one has to use this make sure SP2 in installed as it works better. To start off one should scan thorough the code looking for common patterns or keywords such as "User", "Password", "Pswd", "Key", "Http", etc... This can be done using the "Find in Files" tool in VS or using findstring as follows:
[Find In Files HERE]
findstr /s /m /i /d:c:\projects\codebase\sec "http" *.*
Looking for Keywords
Form Fields and user Input
Many of these function calls can be used for Cross-Site-Scripting attacks. One should search for them throughout the codebase and verify that thay are not vulnerable to XSS attacks or client side injection attacks.
Request.form Request.write <%=
Query Strings
Request.QueryString["name"]);
Cookies
SQL & Database
HTTP Requests
HTML Tags
HtmlEncode URLEncode
web.config settings
requestEncoding ,responseEncoding