{"id":31,"date":"2010-10-01T06:49:00","date_gmt":"2010-10-01T06:49:00","guid":{"rendered":"https:\/\/freezion.com\/?p=31"},"modified":"2010-10-01T06:49:00","modified_gmt":"2010-10-01T06:49:00","slug":"on-security-research","status":"publish","type":"post","link":"https:\/\/freezion.com\/?p=31","title":{"rendered":"on security research"},"content":{"rendered":"<p>I\u2019ve been pondering URL rewriting for the past couple of days &#8211; trying to come up with some way a client of a web site can first: determine if URL rewriting is occurring on a given web server, and second: in cases where it is used, determine what the rewrite rules are.<br \/>\nAs I have been thinking about this, it occurred to me that, despite the proliferation of security research whitepapers and blog posts, there is a scarcity of \u2018this is the process I went through to do this research\u2019 information out there.<\/p>\n<p>There are mountains of articles and documents, with dizzying arrays of statistics and metrics (often intermingled with a fair amount of marketing fluff), and yet most of the whitepapers, and certainly the various conference presentations, simply don\u2019t talk about the process &#8211; preferring instead to present the end results.<br \/>\nAs security professionals, we gather together at a multitude of conferences where we do a wonderful job displaying all of this shiny data and showing off new marvelous tricks to each other with varying degrees of self-indulgence. Yet most of how we came to have such cool stuff is left out of the picture entirely.<\/p>\n<p>I understand why that is, of course. Simply put, the process is boring! It\u2019s full of failure, and repeatedly throwing things at a wall and observing what happens. Nobody wants to sit in a small room with a couple hundred hackers listening to someone drone on for an hour about how \u201cthis didn\u2019t work\u2026and neither did this\u201d, I get that. Added to that is the fact that, in some cases, the research is being done for a corporate (or government) entity. In such a situation, the process may be withheld not from a lack of desire to share on the researcher\u2019s part, but because they are not permitted to do so by the organization for which the work was done.<\/p>\n<p>Despite these reasons, in my opinion it is a disservice to ourselves, to the profession, and to others whom may be interested in performing their own research, when we all we do is deliver an end product in glossy PDF or a shiny PowerPoint presentation. That is simply not research, it\u2019s promotion. Research, in an academic sense, implies documenting the entire process: both success and failure. This is not what I find when I look at the typical infosec industry output.<\/p>\n<p>Accordingly, I\u2019ve decided that I will share <strong>how<\/strong> I go about this particular project, and not just release some PDF or tool as a result of it. I\u2019ll post my process here, any notes and thoughts, as well as any code I come up with. (Well, links to code anyway. I\u2019ll probably keep the code itself in github).<\/p>\n<p>One of the reasons I\u2019m doing this is that I expect to fail. =)<\/p>\n<p>As I\u2019ve considered how one can detect URL rewriting, and as I\u2019ve started investigating the details of how it works, my initial thought is that detecting it simply won\u2019t be possible.<\/p>\n<p>If that\u2019s correct, I think it\u2019s important that I present what I tried, along with the fact that ultimately it didn\u2019t work. That\u2019s vital information, in that it prevents someone else from wasting cycles repeating a process that\u2019s already been done.<\/p>\n<p>As well, understanding why something failed may lead to discovering a way to succeed.<\/p>\n<p>OK\u2026 this rant being done now, my <a href=\"https:\/\/freezion.com\/2010\/10\/01\/detecting-url-rewriting-part-1\/\">next post<\/a> will start the process of documenting my research into detecting URL rewriting.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I\u2019ve been pondering URL rewriting for the past couple of days &#8211; trying to come up with some way&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,4],"tags":[23,46,49],"class_list":["post-31","post","type-post","status-publish","format-standard","hentry","category-hacking","category-musing","tag-infosec","tag-rambling","tag-research"],"_links":{"self":[{"href":"https:\/\/freezion.com\/index.php?rest_route=\/wp\/v2\/posts\/31","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/freezion.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/freezion.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/freezion.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/freezion.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=31"}],"version-history":[{"count":0,"href":"https:\/\/freezion.com\/index.php?rest_route=\/wp\/v2\/posts\/31\/revisions"}],"wp:attachment":[{"href":"https:\/\/freezion.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=31"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/freezion.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=31"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/freezion.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}