The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


particular network are believed to be trusted, it is safer to use secure transport



Download 5,76 Mb.
Pdf ko'rish
bet251/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   247   248   249   250   251   252   253   254   ...   875
Bog'liq
3794 1008 4334

particular network are believed to be trusted, it is safer to use secure transport

mechanisms when passing sensitive data over it.

Even if login occurs over HTTPS, credentials may still be disclosed to unau-

thorized parties if the application handles them in an unsafe manner:

■■

If credentials are transmitted as query string parameters, as opposed to



in the body of a 

POST


request, then these are liable to be logged in vari-

ous places — for example, within the user’s browser history, within the

web server logs, and within the logs of any reverse proxies employed

within the hosting infrastructure. If an attacker succeeds in compromis-

ing any of these resources, then he may be able to escalate privileges by

capturing the user credentials stored there.

■■

Although most web applications do use the body of a 



POST

request to

submit the HTML login form itself, it is surprisingly common to see the

login request being handled via a redirect to a different URL with the

same credentials passed as query string parameters. Why application

developers consider it necessary to perform these bounces is not clear,

but having elected to do so, it is easier to implement them as 302 redi-

rects to a URL than as 

POST

requests using a second HTML form sub-



mitted via JavaScript.

■■

Web applications sometimes store user credentials in cookies, usually to



implement poorly designed mechanisms for login, password change,

“remember me,” and so on. These credentials are vulnerable to capture




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   247   248   249   250   251   252   253   254   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish