Hunter Tip #2 Nullie the Elephant

本文介绍了一种使用NULL值绕过应用服务器侧检查的方法,通过构造特定的POST数据,可以获取到敏感信息,如姓名、电话号码等。此攻击手段在多个应用程序中被验证有效。


Nullie the Elephant

Summary:

This is a quick paper about another typical attack I find that has proved successful throughout my own bug hunting.  It is likely this may often be over looked by Bug Hunters.  So I am sharing another tip with you.

Description:

Unfortunately I do not have any real examples I can show you as the programs have stated “no disclosure”.  That being said, I recently discovered another successful attack using this method in a financial services program, so I will talk around this discovery.  In this attack, I wanted to gain access to other people’s card information.

Below is an example of POST data within a normal request.  (I have reduced the POST data to the relevant fields)

{“name":{"first_name":"Mark","last_name":"Litchfield"},"phone":"5555555555","CardNumber":"548401066"}

 

This would return a lot of user information, to include

  • First name
  • Last name
  • Home phone number
  • Cell phone number
  • Full postal address
  • Email address
  • Date Of Birth
  • Card Rewards
  • Secret Question – why ??
  • Secret Answer – definitely why ??

 

So the first stage would be to simply enumerate the CardNumber parameter.  However this replied with:

We’re sorry, but your information doesn’t match your profile. Please retry using your first name, last name, your account number and mobile numbers

So at this stage, we would need to know quite a lot of information to get access to the card.  In a real attack scenario, this would essentially be game over.

However, I persisted and sent:

{"name":{"first_name":"","last_name":""},"phone":"","CardNumber":"548401066"}

 

Same error, I tried again with

{"CardNumber":"548401066"}

 

Same error. 

This time I sent a true NULL value (note the absence of the quotation marks)

{"name":{"first_name":NULL,"last_name":NULL},"phone":NULL,"CardNumber":"548401066"}

 

It passed the application server side checks and returned me the following information.  Clearly in this request, we did not send the First Name / Last Name / Phone Number, but it happily returned us the values.

  • First name
  • Last name
  • Home phone number
  • Cell phone number
  • Full postal address
  • Email address
  • Date Of Birth
  • Card Rewards
  • Secret Question
  • Secret Answer

 

I have seen this work on a number of applications.  So when in doubt, always try a NULL

 

原文链接:https://www.bugbountyhq.com/front/latestnews/MUlhdGtuMjF3b0FKekdwSlBlR0RUUT09/

基于matlab建模FOC观测器采用龙贝格观测器+PLL进行无传感器控制(Simulink仿真实现)内容概要:本文档主要介绍基于Matlab/Simulink平台实现的多种科研仿真项目,涵盖电机控制、无人机路径规划、电力系统优化、信号处理、图像处理、故障诊断等多个领域。重点内容之一是“基于Matlab建模FOC观测器,采用龙贝格观测器+PLL进行无传感器控制”的Simulink仿真实现,该方法通过状态观测器估算电机转子位置与速度,结合锁相环(PLL)实现精确控制,适用于永磁同步电机等无位置传感器驱动场景。文档还列举了大量相关科研案例与算法实现,如卡尔曼滤波、粒子群优化、深度学习、多智能体协同等,展示了Matlab在工程仿真与算法验证中的广泛应用。; 适合人群:具备一定Matlab编程基础,从事自动化、电气工程、控制科学、机器人、电力电子等相关领域的研究生、科研人员及工程技术人员。; 使用场景及目标:①学习并掌握FOC矢量控制中无传感器控制的核心原理与实现方法;②理解龙贝格观测器与PLL在状态估计中的作用与仿真建模技巧;③借鉴文中丰富的Matlab/Simulink案例,开展科研复现、算法优化或课程设计;④应用于电机驱动系统、无人机控制、智能电网等实际工程仿真项目。; 阅读建议:建议结合Simulink模型与代码进行实践操作,重点关注观测器设计、参数整定与仿真验证流程。对于复杂算法部分,可先从基础案例入手,逐步深入原理分析与模型改进。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值