The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet19/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   15   16   17   18   19   20   21   22   ...   875
Bog'liq
3794 1008 4334

Introduction

xxix

70779flast.qxd:WileyRed  9/14/07  3:12 PM  Page xxix




 disclosure that you can exploit. We describe how you can investigate anom-

alous behavior and error messages to gain a deeper understanding of the

application’s internal workings and fine-tune your attack. We also cover ways

of manipulating defective error handling to systematically retrieve sensitive

information from the application.

Chapter 15, “Attacking Compiled Applications,” examines a set of impor-

tant vulnerabilities which arise in applications written in native code lan-

guages like C and C++. These vulnerabilities include buffer overflows, integer

vulnerabilities, and format string flaws. This is a potentially huge topic, and

we focus on ways of detecting these vulnerabilities in web applications, and

look at some real-world examples of how these have arisen and been

exploited.

Chapter 16, “Attacking Application Architecture,” examines an important

area of web application security that is frequently overlooked. Many applica-

tions employ a tiered architecture, and a failure to segregate different tiers

properly often leaves an application vulnerable, enabling an attacker who has

found a defect in one component to quickly compromise the entire applica-

tion. A different range of threats arises in shared hosting environments, where

defects or malicious code in one application can sometimes be exploited to

compromise the environment itself and other applications running within it.

Chapter 17, “Attacking the Web Server,” describes various ways in which

you can target a web application by targeting the web server on which it is

running. Vulnerabilities in web servers are broadly composed of defects in

their configuration and security flaws within the web server software. This

topic is on the boundary of the scope of this book, because the web server is

strictly a different component in the technology stack. However, most web

applications are intimately bound up with the web server on which they run;

therefore, attacks against the web server are included in the book because they

can often be used to compromise an application directly, rather than indirectly

by first compromising the underlying host.

Chapter 18, “Finding Vulnerabilities in Source Code,” describes a com-

pletely different approach to finding security flaws than those described else-

where within this book. There are many situations in which it may be possible

to perform a review of an application’s source code, not all of which require

any cooperation from the application’s owner. Reviewing an application’s

source code can often be highly effective in discovering vulnerabilities that

would be difficult or time-consuming to detect by probing the running appli-

cation. We describe a methodology, and provide a language-by-language cheat

sheet, to enable you to perform an effective code review even if you have very

limited programming experience yourself.

Chapter 19, “A Web Application Hacker’s Toolkit,” pulls together in one place

the various tools described in the course of this book, and which the authors use

when attacking real-world web applications. We describe the strengths and


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   15   16   17   18   19   20   21   22   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish