The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Try to identify any locations within the application that may contain clues



Download 5,76 Mb.
Pdf ko'rish
bet163/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   159   160   161   162   163   164   165   166   ...   875
Bog'liq
3794 1008 4334

Try to identify any locations within the application that may contain clues

about the internal structure and functionality of other areas. 



It may not be possible to draw any firm conclusions here; however, the



cases identified may prove useful at a later stage of the attack when

attempting to exploit any potential vulnerabilities.

Mapping the Attack Surface

The final stage of the mapping process is to identify the various attack surfaces

exposed by the application, and the potential vulnerabilities that are com-

monly associated with each one. The following is a rough guide to some key

types of behavior and functionality that you may identify, and the kinds of

vulnerability that are most commonly found within each one. The remainder

of this book will be concerned with the practical details of how you can detect

and exploit each of these problems:

■■

Client-side validation — Checks may not be replicated on the server.



■■

Database interaction — SQL injection.

■■

File uploading and downloading — Path traversal vulnerabilities.



■■

Display of user-supplied data — Cross-site scripting.

■■

Dynamic redirects — Redirection and header injection attacks.



■■

Login — Username enumeration, weak passwords, ability to use brute

force.

■■

Multistage login — Logic flaws.



■■

Session state — Predictable tokens, insecure handling of tokens.

■■

Access controls — Horizontal and vertical privilege escalation.




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   159   160   161   162   163   164   165   166   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish