The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 6  ■ Attacking Authentication



Download 5,76 Mb.
Pdf ko'rish
bet263/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   259   260   261   262   263   264   265   266   ...   875
Bog'liq
3794 1008 4334

Chapter 6 



Attacking Authentication



149

70779c06.qxd:WileyRed  9/14/07  3:13 PM  Page 149




which account their session is currently using. An attacker may be able

to modify this value and gain access to other user accounts without

authentication, as shown in Figure 6-6.

Figure 6-6: A vulnerable user impersonation function

■■

If an application allows administrative users to be impersonated, then



any weakness in the impersonation logic may result in a vertical privi-

lege escalation vulnerability — rather than simply gaining access to

other ordinary users’ data, an attacker may gain full control of the

application.

■■

Some impersonation functionality is implemented as a simple “back-



door” password that can be submitted to the standard login page along

with any username in order to authenticate as that user. This design is

highly insecure for many reasons, but the biggest opportunity for

attackers is that they are likely to discover this password when per-

forming standard attacks such as brute forcing of the login. If the back-

door password is matched before the user’s actual password, then the

attacker is likely to discover the function of the backdoor password and

so gain access to every user’s account. Similarly, a brute-force attack

might result in two different “hits,” thereby revealing the backdoor

password as shown in Figure 6-7.




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   259   260   261   262   263   264   265   266   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish