Offensive AI

Enhancing Directory Brute-forcing Attack with the Use of Language Models

Conference Paper (2024)
Author(s)

Alberto Castagnaro (Student TU Delft)

Mauro Conti (Università degli Studi di Padova, TU Delft - Cyber Security)

Luca Pajola (Università degli Studi di Padova, Spritz Matter Srl)

Research Group
Cyber Security
DOI related publication
https://doi.org/10.1145/3689932.3694770
More Info
expand_more
Publication Year
2024
Language
English
Research Group
Cyber Security
Pages (from-to)
184-195
ISBN (electronic)
979-8-4007-1228-9
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Web Vulnerability Assessment and Penetration Testing (Web VAPT) is a comprehensive cybersecurity process that uncovers a range of vulnerabilities which, if exploited, could compromise the integrity of web applications. In a VAPT, it is common to perform a Directory brute-forcing Attack, aiming at the identification of accessible directories of a target website. Current commercial solutions are inefficient as they are based on brute-forcing strategies that use wordlists, resulting in enormous quantities of trials for a small amount of success.

Offensive AI is a recent paradigm that integrates AI-based technologies in cyber attacks. In this work, we explore whether AI can enhance the directory enumeration process and propose a novel Language Model-based framework. Our experiments -- conducted in a testbed consisting of 1 million URLs from different web application domains (universities, hospitals, government, companies) -- demonstrate the superiority of the LM-based attack, with an average performance increase of 969%.