The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 7  ■ Attacking Session Management



Download 5,76 Mb.
Pdf ko'rish
bet330/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   326   327   328   329   330   331   332   333   ...   875
Bog'liq
3794 1008 4334

Chapter 7 



Attacking Session Management



185

70779c07.qxd:WileyRed  9/14/07  3:13 PM  Page 185




140

125


391

78

The sequence does not appear to contain a reliably predictable pattern; how-



ever, it would clearly be possible to brute force the relevant number range in

an automated attack to discover valid values in the sequence. Before attempt-

ing this attack, however, we wait a few minutes and gather a further sequence

of tokens:

3124553-1172764800468

3124554-1172764800609

3124555-1172764801109

3124556-1172764801406

3124557-1172764801703

3124558-1172764802125

3124559-1172764802500

3124560-1172764802656

3124561-1172764803125

3124562-1172764803562

Comparing this second sequence of tokens with the first, two points are

immediately obvious:

■■

The first numeric sequence continues to progress incrementally; how-



ever, five values have been skipped since the end of our first sequence.

This is presumably because the missing values have been issued to

other users, who logged into the application in the window between

the two tests.

■■

The second numeric sequence continues to progress by similar intervals



as before; however, the first value we obtain is a massive 539,578

greater than the previous value.

This second observation immediately alerts us to the role played by time in

generating session tokens. Apparently, only five tokens have been issued

between the two token-grabbing exercises. However, a period of approxi-

mately 10 minutes has also elapsed. The most likely explanation is that the sec-

ond number is time-dependent and is probably a simple count of milliseconds.

Indeed, our hunch is correct, and in a subsequent phase of our testing 

we perform a code review, which reveals the following token-generation 

algorithm:

String sessId = Integer.toString(s_SessionIndex++) +

“-“ +


System.currentTimeMillis();


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   326   327   328   329   330   331   332   333   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish