Re: [W3af-develop] Integer overflow detection plugin

2013-07-15 Thread Andres Riancho
And if Tomas shares his code, that would be nice too :D On Mon, Jul 15, 2013 at 11:49 AM, Dominique Righetto wrote: > Hi, > > Thanks you. I will use your feedback to understand and find the > vulnerability detection methods. > > Best regards, > Dom > > -- > Cordialement, Best regards, > Dominique

Re: [W3af-develop] Integer overflow detection plugin

2013-07-15 Thread Dominique Righetto
Hi, Thanks you. I will use your feedback to understand and find the vulnerability detection methods. Best regards, Dom -- Cordialement, Best regards, Dominique Righetto dominique.righe...@gmail.com dominique.righe...@owasp.org Twitter: @righettod GPG: 0x323D19BA http://www.righettod.eu "No trees

Re: [W3af-develop] Integer overflow detection plugin

2013-07-15 Thread Andres Riancho
On Sun, Jul 14, 2013 at 4:49 AM, Dominique RIGHETTO wrote: > Hi Tomas, > > Thanks you very much. > > I try to understand the objective of each of the value in > ["-012345", "-2147483649", "-2147483648", "012345", "2147483647", > "2147483648", "4294967295", "4294967296", "023456"]. > >

Re: [W3af-develop] Integer overflow detection plugin

2013-07-15 Thread Andres Riancho
On Sat, Jul 13, 2013 at 10:48 AM, Tomas Velazquez wrote: > Hi Dominique, > > Months ago I code a poc of integer overflow, but it is unfinished. Well, then you guys should work together on it :) > My code is based on skipfish detection: > http://code.google.com/p/skipfish/source/browse/trunk/src/

Re: [W3af-develop] Integer overflow detection plugin

2013-07-15 Thread Andres Riancho
The xss [0] plugin is a good example for what you're trying to achieve. The interesting parts are: fake_mutants = create_mutants(freq, ['',]) Where you create mutants (modified http requests) based on a fuzzable request (which is the result of the crawling phase) with a "fake" value of an emp