Preliminary Study of LLM-Based Wordlist Generation for Validating Broken Web Access Control

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The public websites have become targets for hackers, resulting in reputational and financial losses. A considerable portion of cybersecurity issues arise from web attacks. Web vulnerabilities can often be traced back to web servers that have been misconfigured by unskilled administrators. Broken web access control leads to unauthorized access to sensitive resources and data. A wordlist-based testing is used to identify such vulnerabilities. This paper will discuss the threats posed by such misconfigured web services and explore how the LLM scanning approach generates wordlists, thereby enhancing the efficiency of identifying vulnerabilities within the web server. The study concluded that using different LLM models, in conjunction with summarization, role-playing, and Chain-of-Thought (CoT) techniques, enhances the discovery of web paths.

Cite

CITATION STYLE

APA

Ng, K. K. S., Yan, F., & Hung, K. (2024). Preliminary Study of LLM-Based Wordlist Generation for Validating Broken Web Access Control. In IEEE Region 10 Annual International Conference, Proceedings/TENCON (pp. 1088–1091). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/TENCON61640.2024.10902771

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free