The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Developers typically use meaningful names for ActiveX methods, and it



Download 5,76 Mb.
Pdf ko'rish
bet219/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   215   216   217   218   219   220   221   222   ...   875
Bog'liq
3794 1008 4334

Developers typically use meaningful names for ActiveX methods, and it

may be possible to identify useful methods simply from their names.



You can sometimes determine the purpose of a function by systemati-



cally invoking it with different inputs and monitoring both the visible

behavior of the control and its internal workings using your debugger.

122

Chapter 5 



Bypassing Client-Side Controls

70779c05.qxd:WileyRed  9/16/07  5:14 PM  Page 122



Fixing Inputs Processed by Controls

A common use to which ActiveX controls are put is as a client-side control to

verify that the client computer complies with specific security standards before

access is granted to certain server-side functionality. For example, in an attempt

to mitigate against keylogging attacks, an online banking application may

install a control that checks for the presence of a virus scanner, and the operat-

ing system patch level, before permitting a user to log in to the application.

If you need to circumvent this type of client-side control, it is usually easy to

do. The ActiveX control will typically read various details from the local com-

puter’s file system and registry as input data for its checks. You can monitor

the information being read and feed arbitrary inputs into the control that com-

ply with its security checks.

The Filemon and Regmon tools originally developed by Sysinternals (and

now owned by Microsoft) enable you to monitor all of a process’s interaction

with the computer’s file system and registry. You can filter the tools’ output to

display only the activity of the process you are interested in. When an ActiveX

control is performing security checks on the client computer, you will typically

see it querying security-relevant files and registry keys, such as items created

by antivirus products, as shown in Figure 5-8.

Figure 5-8:  Regmon being used to capture the registry access carried 

out by an ActiveX control

In this situation, it is usually sufficient to manually create the relevant file or

registry key, to convince the control that the corresponding software is installed.

If for some reason you do not wish to interfere with the actual operating system,


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   215   216   217   218   219   220   221   222   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish