The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet17/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   13   14   15   16   17   18   19   20   ...   875
Bog'liq
3794 1008 4334

Introduction xxvii

70779flast.qxd:WileyRed  9/14/07  3:12 PM  Page xxvii




and (b) to rely upon client-side checks on user input. In this chapter, we exam-

ine a range of interesting technologies, including lightweight controls imple-

mented within HTML, HTTP, and JavaScript, and more heavyweight controls

using Java applets, ActiveX controls, and Shockwave Flash objects.

Chapters 6 to 8 examine some of the most important defense mechanisms

implemented within web applications: those responsible for controlling user

access. Chapter 6, “Attacking Authentication,” examines the various functions

by which applications gain assurance of the identity of their users. This

includes the main login function and also the more peripheral authentication-

related functions such as user registration, password changing, and account

recovery. Authentication mechanisms contain a wealth of different vulnerabil-

ities, in both design and implementation, which an attacker can leverage to

gain unauthorized access. These range from obvious defects, such as bad pass-

words and susceptibility to brute-force attacks, to more obscure problems

within the authentication logic. We also examine in detail the type of multi-

stage login mechanisms used in many security-critical applications, and

describe the new kinds of vulnerability which these frequently contain.

Chapter 7, “Attacking Session Management,” examines the mechanism by

which most applications supplement the stateless HTTP protocol with the con-

cept of a stateful session, enabling them to uniquely identify each user across

several different requests. This mechanism is a key target when you are attack-

ing a web application, because if you can break it, then you can effectively

bypass the login and masquerade as other users without knowing their cre-

dentials. We look at various common defects in the generation and transmis-

sion of session tokens, and describe the steps you can take to discover and

exploit these.

Chapter 8, “Attacking Access Controls,” examines the ways in which appli-

cations actually enforce access controls, relying upon the authentication and

session management mechanisms to do so. We describe various ways in which

access controls can be broken and the ways in which you can detect and

exploit these weaknesses.

Chapter 9, “Injecting Code,” covers a large category of related vulnerabili-

ties, which arise when applications embed user input into interpreted code in

an unsafe way. We begin with a detailed examination of SQL injection vulner-

abilities, covering the full range of attacks from the most obvious and trivial to

advanced exploitation techniques involving out-of-band channels, inference,

and time delays. For each kind of vulnerability and attack technique, we

describe the relevant differences between three common types of databases:

MS-SQL, Oracle, and MySQL. We then cover several other categories of injec-

tion vulnerability, including the injection of operating system commands,

injection into web scripting languages, and injection into the SOAP, XPath,

SMTP, and LDAP protocols. 




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   13   14   15   16   17   18   19   20   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish