Offensive AI

Enhancing Directory Brute-forcing Attack with the Use of Language Models

Conference Paper (2024)
Author(s)

Alberto Castagnaro (Student TU Delft)

Mauro Conti (Università degli Studi di Padova, TU Delft - Cyber Security)

Luca Pajola (Università degli Studi di Padova, Spritz Matter Srl)

Research Group
Cyber Security
DOI related publication
https://doi.org/10.1145/3689932.3694770
More Info
expand_more
Publication Year
2024
Language
English
Research Group
Cyber Security
Pages (from-to)
184-195
ISBN (electronic)
979-8-4007-1228-9
Event
17th ACM Workshop on Artificial Intelligence and Security (2024-10-18 - 2024-10-18), Salt Lake City, United States
Downloads counter
115
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Web Vulnerability Assessment and Penetration Testing (Web VAPT) is a comprehensive cybersecurity process that uncovers a range of vulnerabilities which, if exploited, could compromise the integrity of web applications. In a VAPT, it is common to perform a Directory brute-forcing Attack, aiming at the identification of accessible directories of a target website. Current commercial solutions are inefficient as they are based on brute-forcing strategies that use wordlists, resulting in enormous quantities of trials for a small amount of success.

Offensive AI is a recent paradigm that integrates AI-based technologies in cyber attacks. In this work, we explore whether AI can enhance the directory enumeration process and propose a novel Language Model-based framework. Our experiments -- conducted in a testbed consisting of 1 million URLs from different web application domains (universities, hospitals, government, companies) -- demonstrate the superiority of the LM-based attack, with an average performance increase of 969%.