{"id":2678,"date":"2010-04-27T11:34:40","date_gmt":"2010-04-27T10:34:40","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=2678"},"modified":"2015-09-09T19:37:36","modified_gmt":"2015-09-09T11:37:36","slug":"fuzzdb-comprehensive-set-of-known-attack-sequences","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2010\/04\/fuzzdb-comprehensive-set-of-known-attack-sequences\/","title":{"rendered":"fuzzdb – Comprehensive Set Of Known Attack Sequences"},"content":{"rendered":"

fuzzdb is a comprehensive set of known attack pattern sequences, predictable locations, and error messages for intelligent brute force testing and exploit condition identification of web applications.<\/p>\n

Many mechanisms of attack used to exploit different web server platforms and applications are triggered by particular meta-characters that are observed in more than one product security advisory. fuzzdb is a database attack patterns known to have caused exploit conditions in the past, categorized by attack type, platform, and application.<\/p>\n

Because of the popularity of a small number of server types, platforms, and package formats, resources such as logfiles and administrative directories are typically located in a small number of predictable locations. A comprehensive database of these, sorted by platform type, makes brute force fuzz testing a scalpel-like approach.<\/p>\n

Since system errors contain predictable strings, fuzzdb contains lists of error messages to be pattern matched against server output in order to aid detection software security defects.<\/p>\n

Primary sources used for attack pattern research:<\/p>\n