The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet292/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   288   289   290   291   292   293   294   295   ...   875
Bog'liq
3794 1008 4334

162

Chapter 6 



Attacking Authentication

70779c06.qxd:WileyRed  9/14/07  3:13 PM  Page 162



■■

Any system-generated usernames and passwords should be created

with sufficient entropy that they cannot feasibly be sequenced or pre-

dicted even by an attacker who gains access to a large sample of succes-

sively generated instances.

■■

Users should be permitted to set sufficiently strong passwords — for



example, long passwords should be allowed, and a wide range of char-

acters should be allowed.



Handle Credentials Secretively

■■

All credentials should be created, stored, and transmitted in a manner



that does not lead to unauthorized disclosure.

■■

All client-server communications should be protected using a well-



established cryptographic technology, such as SSL. Custom solutions

for protecting data in transit are neither necessary nor desirable.

■■

If it is considered preferable to use HTTP for the unauthenticated areas



of the application, ensure that the login form itself is loaded using

HTTPS, rather than switching to HTTPS at the point of the login 

submission.

■■

Only 



POST

requests should be used for transmitting credentials to the

server. Credentials should never be placed in URL parameters or cook-

ies (even ephemeral ones). Credentials should never be transmitted

back to the client, even in parameters to a redirect.

■■

All server-side application components should store credentials in a



manner that does not allow their original values to be easily recovered

even by an attacker who gains full access to all the relevant data within

the application’s database. The usual means of achieving this objective

is to use a strong hash function (such as SHA-256, at the time of this

writing), appropriately salted to reduce the effectiveness of precom-

puted offline attacks.

■■

Client-side “remember me” functionality should in general only



remember nonsecret items such as usernames. In less security-critical

applications, it may be considered appropriate to allow users to opt 

in to a facility to remember passwords. In this situation, no clear-text

credentials should be stored on the client (the password should be

stored reversibly encrypted using a key known only to the server), and

users should be warned about the risks from an attacker with physical

access to their computer or who compromises their computer remotely.

Particular attention should be paid to eliminating cross-site scripting




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   288   289   290   291   292   293   294   295   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish