The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet378/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   374   375   376   377   378   379   380   381   ...   875
Bog'liq
3794 1008 4334

210

Chapter 7 



Attacking Session Management

70779c07.qxd:WileyRed  9/14/07  3:13 PM  Page 210



from accessing subsequent pages. Except where strictly necessary, per-

sonal data should not be displayed back to the user at all. Even where

this is required (e.g., a “confirm order” page showing addresses), sensi-

tive items such as credit card numbers and passwords should never be

displayed back to the user and should always be masked within the

source of the application’s response.



Per-Page Tokens

Finer-grained control over sessions can be achieved, and many kinds of session

attacks made more difficult or impossible, by using per-page tokens in addition to

session tokens. Here, a new page token is created every time a user requests an

application page (as opposed to an image, for example) and is passed to the client

in a cookie or a hidden field of an HTML form. Each time the user makes a

request, the page token is validated against the last value issued, in addition to the

normal validation of the main session token. In the case of a non-match, the entire

session is terminated. Many of the most security-critical web applications on the

Internet, such as online banks, employ per-page tokens to provide increased pro-

tection for their session management mechanism, as shown in Figure 7-5.

Figure 7-5:  Per-page tokens used in a banking application

While the use of per-page tokens does impose some restrictions on navigation

(for example, on use of the back and forward buttons and multi-window brows-

ing), it effectively prevents session fixation attacks and ensures that the simulta-

neous use of a hijacked session by a legitimate user and an attacker will quickly

be blocked after both have made a single request. Per-page tokens can also be

leveraged to track the user’s location and movement through the application,

and used to detect attempts to access functions out of a defined sequence, help-

ing to protect against certain access control defects (see Chapter 8).


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   374   375   376   377   378   379   380   381   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish