The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet303/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   299   300   301   302   303   304   305   306   ...   875
Bog'liq
3794 1008 4334

Figure 6-8: A CAPTCHA control 

designed to hinder automated attacks



T I P

If you are attacking an application that uses CAPTCHA controls to hinder

automation, always closely review the HTML source for the page in which the

image appears. The authors have encountered cases where the solution to the

puzzle appears in literal form within the 

ALT


attribute of the image tag, or

within a hidden form field, enabling a scripted attack to defeat the protection

without actually solving the puzzle itself.

Chapter 6 



Attacking Authentication



169

70779c06.qxd:WileyRed  9/14/07  3:13 PM  Page 169




Prevent Misuse of the Password Change Function

■■

A password change function should always be implemented, to allow



periodic password expiration (if required) and to allow users to change

passwords if they wish to for any reason. As a key security mechanism,

this needs to be very well defended against misuse.

■■

The function should only be accessible from within an authenticated



session.

■■

There should be no facility to provide a username, either explicitly or



via a hidden form field or cookie — users have no legitimate need to

attempt to change other people’s passwords.

■■

As a defense-in-depth measure, the function should be protected from



unauthorized access gained via some other security defect in the appli-

cation — such as a session hijacking vulnerability, cross-site scripting,

or even an unattended terminal. To this end, users should be required

to reenter their existing password.

■■

The new password should be entered twice to prevent mistakes, and



the application should compare the “new password” and “confirm new

password” fields as its first step and return an informative error if they

do not match.

■■

The function should prevent the various attacks that can be made



against the main login mechanism: a single generic error message

should be used to notify users of any error in existing credentials, and

the function should be temporarily suspended following a small num-

ber of failed attempts to change password.

■■

Users should be notified out-of-band (e.g., via email) that their pass-



word has been changed, but the message should not contain either their

old or new credentials.




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   299   300   301   302   303   304   305   306   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish