Carry out a successful login while monitoring all traffic in both directions
between the client and server.
■■
Identify every case in which the credentials are transmitted in either
direction. You can set interception rules in your intercepting proxy to flag
messages containing specific strings (see Chapter 19).
■■
If any instances are found in which credentials are submitted in a URL
query string, or as a cookie, or are transmitted back from the server to
the client, understand what is happening and try to ascertain what pur-
pose the application developers were attempting to achieve. Try to find
every means by which an attacker might interfere with the application’s
logic to compromise other users’ credentials.
■■
If any sensitive information is transmitted over an unencrypted channel,
Do'stlaringiz bilan baham: |