Category:Web-hacking/Attacks-based-on-directories/Directory-listening
You are here | Directory listening
|
Description
A web application or a web site often contains directories and sub directories. Some of them are listed as standard links in the application, enabling an easy navigation within the application. These files, directories and sub directories are "public". At the opposite, some directories must be kept secret since they are only accessible by a category of users (e.g. administrators). They are qualified as "private". If no specific protection is applied on these directories, they could be discovered by a hacker and browsed through the URL. This discovery process is called "directory listening".
robots.txt
Robots.txt or robot.txt files enable to control the indexation of web pages. Be careful not to specify hidden directories in it because it would provide a source of information to hackers. Rather prefer .htaccess protection.
sitemap.xml
Some web sites have a file named sitemap.xml, giving a list of all pages that have to be indexed by robots. Be careful about the content you put in it.
Example
- WebGoat, Bypass a path based Access Control lesson shows how to read non-authorized content by simply locally changing the value of the file.
- WebGoat, Forced Browsing shows how to discover hidden directories in a web application.
- HackThisSite.org, Basic, Level 11 shows how to navigate through non-protected directories to get the information we need.
- HackThisSite.org, Realistic, Level 5 shows how to exploit data contained in a robots.txt file to discover a hidden directory that contains an encrypted password.
- HackThisSite.org, Realistic, Level 12 shows how to use *file* (file://some/file) protocol to read server's hard drive content.
Protection
- Protect the accesses to critical directories with an .htaccess file. Although, be careful about the .htaccess limit methods.
Tools
- dirsearch (recommended)
- Dirbuster is a brute-forcer that automatizes the discovery of hidden directories.
- Wikto automatizes the discovery of hidden directories, based on a database of default directories, on bruteforce methods, and on Google Database.
- nmap http-enum script
- gobuster
Comments
This category currently contains no pages or media.