Preliminary Study of LLM-Based Wordlist Generation for Validating Broken Web Access Control

Kinsey K.S. Ng, Farah Yan, Kevin Hung

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

The public websites have become targets for hackers, resulting in reputational and financial losses. A considerable portion of cybersecurity issues arise from web attacks. Web vulnerabilities can often be traced back to web servers that have been misconfigured by unskilled administrators. Broken web access control leads to unauthorized access to sensitive resources and data. A wordlist-based testing is used to identify such vulnerabilities. This paper will discuss the threats posed by such misconfigured web services and explore how the LLM scanning approach generates wordlists, thereby enhancing the efficiency of identifying vulnerabilities within the web server. The study concluded that using different LLM models, in conjunction with summarization, role-playing, and Chain-of-Thought (CoT) techniques, enhances the discovery of web paths.
Original languageEnglish
Title of host publicationIEEE Region 10 Annual International Conference, Proceedings/TENCON
Pages1088-1091
Number of pages4
DOIs
Publication statusPublished - 2024

Publication series

NameIEEE Region 10 Annual International Conference, Proceedings/TENCON

Keywords

  • Computer Hacking
  • Large Language Models
  • Unauthorized Access
  • Web Attacks

Fingerprint

Dive into the research topics of 'Preliminary Study of LLM-Based Wordlist Generation for Validating Broken Web Access Control'. Together they form a unique fingerprint.

Cite this