Local File Inclusion Vulnerability Scanner with Tor Proxy

Ku Ahmad Haziq Hezret Bin Che Ku Mohd Sahidi, Muhammad Azizi Mohd Ariffin, Muhammad Izzad Ramli, Z. Kasiran
{"title":"Local File Inclusion Vulnerability Scanner with Tor Proxy","authors":"Ku Ahmad Haziq Hezret Bin Che Ku Mohd Sahidi, Muhammad Azizi Mohd Ariffin, Muhammad Izzad Ramli, Z. Kasiran","doi":"10.1109/ICSIPA52582.2021.9576783","DOIUrl":null,"url":null,"abstract":"Web applications have made communication and services for users extremely simple because of the user-friendly interface, global accessibility, and ease of management. However, careless web application design and implementation are crucial to a security compromise that is incredibly troubling both to the user and web administrators. The weakness in Local File Inclusion (LFI) currently exists in many web applications that result in remote code execution in a host server. Hence, detecting the vulnerability of LFI is becoming extremely important to the web owner in taking effective risk mitigation action. Meanwhile, the current vulnerability scanner that is available nowadays focuses more on SQL injection and cross site scripting but fewer over Local File Inclusion vulnerability. Other than that, users cannot observe what sort of sensitive file or data could be obtained by an attacker and maintain the anonymity of the user because current Vulnerability scanner on the market does not integrate with TOR network out-of-the-box. This project proposed an automated system for the identification of LFI vulnerabilities with obscure for web applications. Therefore, the objective of this project is to develop a system that can detect LFI vulnerabilities within the web application and while still able to maintain user anonymity across the network by covering the source IP address of the scanner using the Tor network and simulates how a real-world hacker attacks web application using LFI vulnerability. Furthermore, there are six phases involved in the methodology to complete this project: information gathering, requirement analysis, system design, development, testing, and documentation. Lastly for documentation, is to make a report about Local File Inclusion Vulnerability Scanner with Tor Onion Router Proxy. From the result testing, it indicates that the project can identify any local file inclusion vulnerabilities that exist over the web application while also having the advantage to observe the point of view of an attacker capable of hiding the scanner source of IP address.","PeriodicalId":326688,"journal":{"name":"2021 IEEE International Conference on Signal and Image Processing Applications (ICSIPA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Signal and Image Processing Applications (ICSIPA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSIPA52582.2021.9576783","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Web applications have made communication and services for users extremely simple because of the user-friendly interface, global accessibility, and ease of management. However, careless web application design and implementation are crucial to a security compromise that is incredibly troubling both to the user and web administrators. The weakness in Local File Inclusion (LFI) currently exists in many web applications that result in remote code execution in a host server. Hence, detecting the vulnerability of LFI is becoming extremely important to the web owner in taking effective risk mitigation action. Meanwhile, the current vulnerability scanner that is available nowadays focuses more on SQL injection and cross site scripting but fewer over Local File Inclusion vulnerability. Other than that, users cannot observe what sort of sensitive file or data could be obtained by an attacker and maintain the anonymity of the user because current Vulnerability scanner on the market does not integrate with TOR network out-of-the-box. This project proposed an automated system for the identification of LFI vulnerabilities with obscure for web applications. Therefore, the objective of this project is to develop a system that can detect LFI vulnerabilities within the web application and while still able to maintain user anonymity across the network by covering the source IP address of the scanner using the Tor network and simulates how a real-world hacker attacks web application using LFI vulnerability. Furthermore, there are six phases involved in the methodology to complete this project: information gathering, requirement analysis, system design, development, testing, and documentation. Lastly for documentation, is to make a report about Local File Inclusion Vulnerability Scanner with Tor Onion Router Proxy. From the result testing, it indicates that the project can identify any local file inclusion vulnerabilities that exist over the web application while also having the advantage to observe the point of view of an attacker capable of hiding the scanner source of IP address.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
本地文件包含漏洞扫描器与Tor代理
由于用户友好的界面、全局可访问性和易于管理,Web应用程序使用户的通信和服务变得极其简单。然而,粗心的web应用程序设计和实现对于用户和web管理员来说都是非常麻烦的安全问题至关重要。本地文件包含(LFI)的弱点目前存在于许多web应用程序中,导致在主机服务器上远程执行代码。因此,检测LFI的脆弱性对于网站所有者采取有效的风险缓解行动变得极其重要。同时,目前可用的漏洞扫描器更多地关注SQL注入和跨站脚本,而较少关注本地文件包含漏洞。除此之外,用户无法观察到攻击者可以获得什么样的敏感文件或数据,并保持用户的匿名性,因为目前市场上的漏洞扫描器没有与TOR网络集成。本课题提出了一种用于web应用程序模糊的LFI漏洞自动识别系统。因此,该项目的目标是开发一个系统,可以检测web应用程序中的LFI漏洞,同时仍然能够通过使用Tor网络覆盖扫描仪的源IP地址来保持网络中的用户匿名性,并模拟真实世界的黑客如何使用LFI漏洞攻击web应用程序。此外,完成这个项目的方法包括六个阶段:信息收集、需求分析、系统设计、开发、测试和文档。最后的文档,是做一个关于本地文件包含漏洞扫描器与Tor洋葱路由器代理的报告。从结果测试来看,它表明该项目可以识别存在于web应用程序上的任何本地文件包含漏洞,同时也具有观察攻击者能够隐藏扫描程序IP地址源的优势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Personal Protective Equipment Detection with Live Camera A Fast and Unbiased Minimalistic Resampling Approach for the Particle Filter Sparse Checkerboard Corner Detection from Global Perspective Comparison of Dental Caries Level Images Classification Performance using KNN and SVM Methods An Insight Into the Rise Time of Exponential Smoothing for Speech Enhancement Methods
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1