The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 5  ■ Bypassing Client-Side Controls



Download 5,76 Mb.
Pdf ko'rish
bet231/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   227   228   229   230   231   232   233   234   ...   875
Bog'liq
3794 1008 4334

Chapter 5 



Bypassing Client-Side Controls



131

70779c05.qxd:WileyRed  9/16/07  5:14 PM  Page 131




Questions

Answers can be found at 

www.wiley.com/go/webhacker

.

1. How can data be transmitted via the client in a way that prevents tam-



pering attacks?

2. An application developer wishes to stop an attacker from performing

brute-force attacks against the login function. Because the attacker may

target multiple usernames, the developer decides to store the number of

failed attempts in an encrypted cookie, blocking any request if the num-

ber of failed attempts exceeds five.

How can this defense be bypassed?

3. An application contains an administrative page that is subject to rigor-

ous access controls. The page contains links to diagnostic functions

located on a different web server. Access to these functions should also

be restricted to administrators only. Without implementing a second

authentication mechanism, which of the following client-side mecha-

nisms (if any) could be used to safely control access to the diagnostic

functionality? Is there any further information you would need to help

choose a solution?

(a) The diagnostic functions could check the HTTP 

Referer

header, to

confirm that the request originated on the main administrative page.

(b) The diagnostic functions could validate the supplied cookies, to con-

firm that these contain a valid session token for the main applica-

tion.


(c) The main application could set an authentication token in a hidden

field that is included within the request. The diagnostic function

could validate this to confirm that the user has a session on the main

application. 

4. If a form field includes the attribute 

disabled=true

, it will not be sub-

mitted with the rest of the form. How can you change this behavior?

5. Are there any means by which an application can ensure that a piece of

input validation logic has been run on the client?




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   227   228   229   230   231   232   233   234   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish