The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet321/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   317   318   319   320   321   322   323   324   ...   875
Bog'liq
3794 1008 4334

180

Chapter 7 



Attacking Session Management

70779c07.qxd:WileyRed  9/14/07  3:13 PM  Page 180



Attackers can exploit the meaning within this session token to attempt to

guess the current sessions of other application users. Using a list of enumer-

ated or common usernames, they can quickly generate large numbers of

potentially valid tokens and test these to confirm which are valid.

Tokens that contain meaningful data often exhibit some structure — that is,

they contain several components, often separated by a delimiter, which can be

extracted and analyzed separately to allow an attacker to understand their

function and means of generation. Components that may be encountered

within structured tokens include:

■■

The account username.



■■

The numeric identifier used by the application to distinguish between

accounts.

■■

The user’s first/last human name.



■■

The user’s email address.

■■

The user’s group or role within the application.



■■

A date/time stamp.

■■

An incrementing or predictable number.



■■

The client IP address.

Each different component within a structured token, or indeed the entire

token, may be encoded in different ways, either as a deliberate measure to

obfuscate their content, or simply to ensure safe transport of binary data via

HTTP. Encoding schemes that are commonly encountered include XOR,

Base64, and hexadecimal representation using ASCII characters (see Chapter 3).

It may be necessary to test various different decodings on each component of

a structured token to unpack it to its original form.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   317   318   319   320   321   322   323   324   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish