The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet307/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   303   304   305   306   307   308   309   310   ...   875
Bog'liq
3794 1008 4334

172

Chapter 6 



Attacking Authentication

70779c06.qxd:WileyRed  9/14/07  3:13 PM  Page 172



assumptions being made and spot the subtle logic flaw that can be exploited to

walk right through the door.

The most important lesson when attacking authentication functionality is to

look everywhere. In addition to the main login form, there may be functions to

register new accounts, change passwords, remember passwords, recover for-

gotten passwords, and impersonate other users. Each of these presents a rich

target of potential defects, and problems that have been consciously elimi-

nated within one function very often reemerge within others. Invest the time

to scrutinize and probe every inch of attack surface you can find, and your

rewards may be great.



Questions

Answers can be found at 

www.wiley.com/go/webhacker

.

1. While testing a web application you log in using your credentials of 



joe

and 


pass

. During the login process, you see a request for the following

URL appear in your intercepting proxy:

http://www.wahh-app.com/app?action=login&uname=

joe&password=pass

What three vulnerabilities can you diagnose without probing any 

further?

2. How can self-registration functions introduce username enumeration

vulnerabilities? How can these vulnerabilities be prevented?

3. A login mechanism involves the following steps:

(a) The application requests the user’s username and passcode.

(b) The application requests two randomly chosen letters from the

user’s memorable word. 

Why is the required information requested in two separate steps? What

defect would the mechanism contain if this were not the case?

4. A multistage login mechanism first requests the user’s username and

then various other items across successive stages. If any supplied item

is invalid, the user is immediately returned to the first stage.

What is wrong with this mechanism, and how can the vulnerability be

corrected?




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   303   304   305   306   307   308   309   310   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish