HACK STEPS (continued)
■
The application issues a new item in response to every request.
■
The data in the item appears to be encrypted (and so has no dis-
cernible structure) or signed (and so contains meaningful structure
accompanied by a few bytes of meaningless binary data).
■
The application may reject attempts to submit the same item with
more than one request.
■
If the evidence suggests strongly that the application is not using session
tokens to manage state, then it is unlikely that any of the attacks
described within this chapter will achieve anything. Your time is likely to
be much better spent looking for other serious issues such as broken
access controls or code injection.
Weaknesses in Session Token Generation
Session management mechanisms are often vulnerable to attack because
tokens are generated in an unsafe manner that enables an attacker to identify
the values of tokens that have been issued to other users.
Do'stlaringiz bilan baham: |