The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet302/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   298   299   300   301   302   303   304   305   ...   875
Bog'liq
3794 1008 4334

168

Chapter 6 



Attacking Authentication

70779c06.qxd:WileyRed  9/14/07  3:13 PM  Page 168



failed attempts trigger an account suspension, this means an attacker

can attempt four different passwords on every account without causing

any disruption to users. In a typical application containing many weak

passwords, such an attacker is likely to compromise many accounts.

The effectiveness of this kind of attack will, of course, be massively

reduced if other areas of the authentication mechanism are designed

securely. If usernames cannot be enumerated or reliably predicted, an

attacker will be slowed down by the need to perform a brute-force exer-

cise in guessing usernames. And if strong requirements are in place for

password quality, it is far less likely that the attacker will choose a pass-

word for testing that even a single user of the application has chosen.

In addition to these controls, an application can specifically protect

itself against this kind of attack through the use of CAPTCHA (“Com-

pletely Automated Public Turing test to tell Computers and Humans

Apart”) challenges on every page that may be a target for brute-force

attacks (see Figure 6-8). If effective, this measure can prevent any auto-

mated submission of data to any application page, thereby restricting

all kinds of password-guessing attacks from being executed manually.

Note that much research has been done into CAPTCHA technologies,

and automated attacks against them have in some cases been reliable.

Further, some attackers have been known to devise CAPTCHA-solving

competitions, in which unwitting members of the public are leveraged

as drones to assist the attacker. However, even if a particular kind of

challenge is not entirely effective, it will still lead most casual attackers

to desist and find an application that does not employ the technique.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   298   299   300   301   302   303   304   305   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish