The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 8  ■ Attacking Access Controls  235



Download 5,76 Mb.
Pdf ko'rish
bet424/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   420   421   422   423   424   425   426   427   ...   875
Bog'liq
3794 1008 4334

Chapter 8 



Attacking Access Controls  235

70779c08v6.5.qxd  9/14/07  3:18 PM  Page 235



70779c08v6.5.qxd  9/14/07  3:18 PM  Page 236


237

The topic of code injection is a huge one, encompassing dozens of different

languages and environments, and a wide variety of different attacks. It would

be possible to write an entire book on any one of these areas, exploring all of

the theoretical subtleties of how vulnerabilities can arise and be exploited.

Because this is a practical handbook, we will focus fairly ruthlessly on the

knowledge and techniques that you will need in order to exploit the code

injection flaws that exist in real-world applications.

SQL injection is the elder statesman of code injection attacks, being still one

of the more prevalent vulnerabilities in the wild, and frequently one of the

most devastating. It is also a highly fertile area of current research, and we will

explore in detail all of the latest attack techniques, including filter bypasses,

inference-based attacks, and fully blind exploitation.

We will also examine a host of other common code injection vulnerabilities,

including injection into web scripting languages, SOAP, XPath, email, LDAP,

and the server operating system. In each case, we will describe the practical

steps that you can take to identify and exploit these defects. There is a concep-

tual synergy in the process of understanding each new type of injection. Hav-

ing grasped the essentials of exploiting these half-dozen manifestations of the

flaw, you should be confident that you can draw on this understanding when

you encounter a new category of injection, and indeed devise additional

means of attacking those that others have already studied.




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   420   421   422   423   424   425   426   427   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish