sion tokens, verify whether the
secure
flag is set, preventing them from
ever being transmitted over unencrypted connections.
■
Determine whether, in the normal use of the application, session tokens
are ever transmitted over an unencrypted connection. If so, they should
be regarded as vulnerable to interception.
■
Where the start page uses HTTP, and the application switches to HTTPS
for the login and authenticated areas of the site, verify whether a new
token is issued following login, or whether a token transmitted during
the HTTP stage is still being used to track the user’s authenticated ses-
sion. Also verify whether the application will accept login over HTTP if
the login URL is modified accordingly.
■
Even if the application uses HTTPS for every single page, verify whether
Do'stlaringiz bilan baham: |