-
Notifications
You must be signed in to change notification settings - Fork 72
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Detecting delayed responses/timeouts? #7
Comments
It could work, especially on firewalled hosts in an internal network. First of all, I'd recommend more tests to see how Burp's
|
And of course, there's still the option to do response analysis like Backslash Powered Scanner does; just because DNS-based detection fits so damn well for this vulnerability, it doesn't mean that we have to forget all the other older methods. :) |
Just an implementation hint: I tested time-based tests with Freddy, and it seems that even requests that timeout in burp get reported, contradicting my theory that scanner threads are terminated on timeout. The relevant code from Freddy is here: |
I wonder if it would make sense to generate a low confidence issue if the answer takes >29s to arrive (I've read that Java timeouts after 31s and Burp drops the conn at 30s IIRC), as this can indicate that someone is trying to resolve our JNDI host on the backend?
The text was updated successfully, but these errors were encountered: