The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet27/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   23   24   25   26   27   28   29   30   ...   875
Bog'liq
3794 1008 4334

Common Web Application Functions

Web applications have been created to perform practically every useful func-

tion one could possibly implement online. Examples of web application func-

tions that have risen to prominence in recent years include:

■■

Shopping (Amazon)



■■

Social networking (MySpace)



Chapter 1 



Web Application (In)security



3

70779c01.qxd:WileyRed  9/14/07  3:12 PM  Page 3




■■

Banking (Citibank)

■■

Web search (Google)



■■

Auctions (eBay)

■■

Gambling (Betfair)



■■

Web logs (Blogger)

■■

Web mail (Hotmail)



■■

Interactive information (Wikipedia)

In addition to the public Internet, web applications have been widely

adopted inside organizations to perform key business functions, including

accessing HR services and managing company resources. They are also fre-

quently used to provide an administrative interface to hardware devices such

as printers, and other software such as web servers and intrusion detection

systems.


Numerous applications that predated the rise of web applications have been

migrated to this technology. Business applications like enterprise resource

planning (ERP) software, which were previously accessed using a proprietary

thick-client application, can now be accessed using a web browser. Software

services such as email, which originally required a separate email client, can

now be accessed via web interfaces like Outlook Web Access. This trend is con-

tinuing as traditional desktop office applications such as word processors and

spreadsheets are migrated to web applications, through services like Google

Apps and Microsoft Office Live.

The time is fast approaching when the only client software that most com-

puter users will need is a web browser. A hugely diverse range of functions

will have been implemented using a shared set of protocols and technologies,

and in so doing will have inherited a distinctive range of common security

vulnerabilities.




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   23   24   25   26   27   28   29   30   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish