small language adjustment

This commit is contained in:
liquidsec 2023-03-24 17:55:50 -04:00
parent d7eb3427c4
commit 15756038b3

View file

@ -76,7 +76,7 @@ Everything happened before the JSF implementation could have a look at the ViewS
Now, what are the ingredients for a disaster?
* unencrypted ViewState
* unencrypted ViewState (or, possession of the encryption key)
* Gadget on the classpath of the server
* In case of Mojarra: ViewState configured to reside on the `client`
* In case of MyFaces: ViewState configured to reside on the `client` **or** the `server`
@ -209,7 +209,7 @@ else:
print(GREEN + "[*] Saved to : {}".format(sys.argv[2]))
```
# Detection with Badsecrets
# Known Key Detection with Badsecrets
![Badsecrets](https://github.com/blacklanternsecurity/badsecrets) is a library capable of detecting the use of known cryptographic keys by looking at the products they produce, and checking against a list of known or weak keys. Its `Jsf_viewstate` module is capable of detecting Java Server Faces ViewStates created with known keys on both Mojarra and MyFaces, in addition to unprotected or compressed ViewStates.