The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


on every username. This approach has two benefits: first, you will dis-



Download 5,76 Mb.
Pdf ko'rish
bet243/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   239   240   241   242   243   244   245   246   ...   875
Bog'liq
3794 1008 4334

on every username. This approach has two benefits: first, you will dis-

cover accounts with common passwords more quickly, and second, you

are less likely to trigger any account lockout defenses, because there is a

time delay between successive attempts using each individual account.

138

Chapter 6 



Attacking Authentication

70779c06.qxd:WileyRed  9/14/07  3:13 PM  Page 138



Verbose Failure Messages

A typical login form requires the user to enter two pieces of information (user-

name and password), and some applications require several more (for exam-

ple, date of birth, a memorable place, or a PIN number). 

When a login attempt fails, you can of course infer that at least one piece of

information was incorrect. However, if the application informs you as to

which piece of information was invalid, you can exploit this behavior to con-

siderably diminish the effectiveness of the login mechanism.

In the simplest case, where a login requires a username and password, an

application might respond to a failed login attempt by indicating whether the

reason for the failure was an unrecognized username or the wrong password,

as illustrated in Figure 6-3.



Figure 6-3: Verbose login failure messages indicating when a valid username has been

guessed


In this instance, you can use an automated attack to iterate through a large

list of common usernames to enumerate which of these are valid. Of course,

usernames are not normally considered a secret (they are not masked during

login, for instance). However, providing an easy means for an attacker to iden-

tify valid usernames increases the likelihood that they will compromise the

application with a given level of time, skill, and effort. A list of enumerated

usernames can be used as the basis for various subsequent attacks, including

password guessing, attacks on user data or sessions, or social engineering.



N OT E


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   239   240   241   242   243   244   245   246   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish