Dom,

    Lets do something, lets schedule it. I'm GMT-3 and during this
week I don't have any fixed appointments yet. If you tell me a
reasonable hour (given my timezone and that I work from 8:30 to
7:30pm) we can schedule a 2h block and join the #w3af channel on IRC
to work on the integer overflow stuff. So, when do you have 2h for
working on this?

Regards,

On Mon, Jul 29, 2013 at 9:32 AM, D M <vints...@gmail.com> wrote:
> Dom,
>
> I was planning on working on the host header plugin.  I did have a similar
> response from the mailing list, which is understandable see everyone is very
> busy.
>
> Maybe you and I can work on this further to get a better idea of how it will
> work?
>
>
> On Mon, Jul 29, 2013 at 8:24 AM, Andres Riancho <andres.rian...@gmail.com>
> wrote:
>>
>> Dom,
>>
>> On Fri, Jul 26, 2013 at 4:41 PM, Dominique Righetto
>> <dominique.righe...@gmail.com> wrote:
>> > Hi,
>> >
>> > I have spend the 2 last week trying to understand how to detect and how
>> > to
>> > reproduce the integer overflow, unfortunately I wasn't able to fully
>> > understand both of them.
>>
>> I feel bad that I / we were unable to help you with that, sorry but
>> I'm focused on other things these days.
>>
>> > I will take another ticket: "HTTP Host header attacks - Audit plugin" if
>> > it's available ?
>>
>> Take a look at the mailing list thread we started a while ago about
>> that, maybe you can take it from there.
>>
>> > Dom
>> >
>> > --
>> > Cordialement, Best regards,
>> > Dominique Righetto
>> > dominique.righe...@gmail.com
>> > dominique.righe...@owasp.org
>> > Twitter: @righettod
>> > GPG: 0x323D19BA
>> > http://www.righettod.eu
>> > "No trees were killed to send this message, but a large number of
>> > electrons
>> > were terribly inconvenienced."
>> >
>> >
>> > On Mon, Jul 15, 2013 at 1:54 PM, Andres Riancho
>> > <andres.rian...@gmail.com>
>> > wrote:
>> >>
>> >> On Sun, Jul 14, 2013 at 4:49 AM, Dominique RIGHETTO
>> >> <dominique.righe...@gmail.com> wrote:
>> >> > Hi Tomas,
>> >> >
>> >> > Thanks you very much.
>> >> >
>> >> > I try to understand the objective of each of the value in
>> >> > ["-0000012345", "-2147483649", "-2147483648", "0000012345",
>> >> > "2147483647",
>> >> > "2147483648", "4294967295", "4294967296", "0000023456"].
>> >> >
>> >> > For values: 2147483647,2147483648,-2147483649,-2147483648
>> >> > I understand because it's a for testing around the limits of the
>> >> > Integer
>> >> > type but for other values I dont understand why they are used and
>> >> > from
>> >> > where
>> >> > they come from ?
>> >>
>> >> The most important part seems to be here [0]
>> >>
>> >> [0]
>> >>
>> >> https://code.google.com/p/skipfish/source/browse/trunk/src/checks.c#1872
>> >>
>> >> > As I understand the vulnerability, according the all the stuff that I
>> >> > can
>> >> > read, is the fact below:
>> >> >
>> >> > A parameter has a Integer overflow vuln if, in the case in which you
>> >> > submit
>> >> > a value over the max/min limit of the Integer, it return a very small
>> >> > negative or positive value.
>> >> >
>> >> > Ex:
>> >> > You submit "2147483648" and the returned value is negative
>> >> > You submit "-2147483648" and the returned value is positive
>> >> >
>> >> > Can you confirm to me that's my understanding is correct ?
>> >>
>> >> I'm no good with these low level bugs, but my basic understanding of
>> >> the vuln makes me think that the best way to detect this vuln is:
>> >> * Send HTTP request with a test payload, lets say... 5 , save it
>> >> * Send HTTP request with a test for integer overflow, which if
>> >> successful would be the same as sending the number 5, (calculate that,
>> >> but it should be -(2^31-5) or something like that), save it
>> >> * Compare the two. If they are equal we're in a case where integer
>> >> overflow is present OR the input is not even used
>> >> * Send one more HTTP request with a number 8 (different from the
>> >> previous), compare with any of the previous ones. If it's different
>> >> then integer overflow is present.
>> >>
>> >> If you want to have lower false positives, after running through those
>> >> steps you could run one more test round, repeating step 1 and 2 with a
>> >> number different than 5.
>> >>
>> >> @Thomas: is this how you were doing it?
>> >>
>> >> > I apologize for all my questions but I really want to fully
>> >> > understand
>> >> > the
>> >> > context of the vulnerability in order to take in account all the
>> >> > cases
>> >> > into
>> >> > the plugin implementation and also learn new things.
>> >> >
>> >> > W3AF team is a very cool learning environment, I feel like a dwarf
>> >> > among
>> >> > giants ;o)))))
>> >> >
>> >> > Thanks in advance.
>> >> >
>> >> > Best regards,
>> >> >
>> >> > Dom
>> >> >
>> >> >
>> >> >
>> >> > On 13/07/2013 15:48, Tomas Velazquez wrote:
>> >> >>
>> >> >> Hi Dominique,
>> >> >>
>> >> >> Months ago I code a poc of integer overflow, but it is unfinished.
>> >> >>
>> >> >> My code is based on skipfish detection:
>> >> >> http://code.google.com/p/skipfish/source/browse/trunk/src/checks.c
>> >> >>
>> >> >> Regards,
>> >> >>
>> >> >>
>> >> >>
>> >> >> On Sat, Jul 13, 2013 at 10:09 AM, Dominique Righetto
>> >> >> <dominique.righe...@gmail.com <mailto:dominique.righe...@gmail.com>>
>> >> >> wrote:
>> >> >>
>> >> >> Hi Andres,
>> >> >>
>> >> >> I'm working on integer overflow detection plugin and I try to
>> >> >> understand, in a audit plugin, how to access to injection points
>> >> >> detected by in discovery part.
>> >> >>
>> >> >> Can you give me some pointer or plugin example ?
>> >> >>
>> >> >> Thanks in advance
>> >> >>
>> >> >> Dom
>> >> >>
>> >> >>
>> >> >>
>> >> >>
>> >> >> ------------------------------------------------------------------------------
>> >> >> See everything from the browser to the database with AppDynamics
>> >> >> Get end-to-end visibility with application monitoring from
>> >> >> AppDynamics
>> >> >> Isolate bottlenecks and diagnose root cause in seconds.
>> >> >> Start your free trial of AppDynamics Pro today!
>> >> >>
>> >> >>
>> >> >>
>> >> >> http://pubads.g.doubleclick.net/gampad/clk?id=48808831&iu=/4140/ostg.clktrk
>> >> >> _______________________________________________
>> >> >> W3af-develop mailing list
>> >> >> W3af-develop@lists.sourceforge.net
>> >> >> <mailto:W3af-develop@lists.sourceforge.net>
>> >> >> https://lists.sourceforge.net/lists/listinfo/w3af-develop
>> >> >>
>> >> >>
>> >> >
>> >>
>> >>
>> >>
>> >> --
>> >> Andrés Riancho
>> >> Project Leader at w3af - http://w3af.org/
>> >> Web Application Attack and Audit Framework
>> >> Twitter: @w3af
>> >> GPG: 0x93C344F3
>> >
>> >
>>
>>
>>
>> --
>> Andrés Riancho
>> Project Leader at w3af - http://w3af.org/
>> Web Application Attack and Audit Framework
>> Twitter: @w3af
>> GPG: 0x93C344F3
>>
>>
>> ------------------------------------------------------------------------------
>> See everything from the browser to the database with AppDynamics
>> Get end-to-end visibility with application monitoring from AppDynamics
>> Isolate bottlenecks and diagnose root cause in seconds.
>> Start your free trial of AppDynamics Pro today!
>>
>> http://pubads.g.doubleclick.net/gampad/clk?id=48808831&iu=/4140/ostg.clktrk
>> _______________________________________________
>> W3af-develop mailing list
>> W3af-develop@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/w3af-develop
>
>



-- 
Andrés Riancho
Project Leader at w3af - http://w3af.org/
Web Application Attack and Audit Framework
Twitter: @w3af
GPG: 0x93C344F3

------------------------------------------------------------------------------
See everything from the browser to the database with AppDynamics
Get end-to-end visibility with application monitoring from AppDynamics
Isolate bottlenecks and diagnose root cause in seconds.
Start your free trial of AppDynamics Pro today!
http://pubads.g.doubleclick.net/gampad/clk?id=48808831&iu=/4140/ostg.clktrk
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to