The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 9  ■ Injecting Code



Download 5,76 Mb.
Pdf ko'rish
bet578/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   574   575   576   577   578   579   580   581   ...   875
Bog'liq
3794 1008 4334

Chapter 9 



Injecting Code



331

70779c09.qxd:WileyRed  9/14/07  3:13 PM  Page 331




diagnosed several potential SQL injection flaws. Which one of the fol-

lowing would be the safest location to test whether more crafted input

has an effect on the application’s processing?

(a) Registering a new user

(b) Updating your personal details

(c) Unsubscribing from the service

4. You have found a SQL injection vulnerability in a login function, and

you try to use the input 

‘ or 1=1--

to bypass the login. Your attack

fails and the resulting error message indicates that the 

--

characters are



being stripped by the application’s input filters. How could you cir-

cumvent this problem?

5. You have found a SQL injection vulnerability but have been unable to

carry out any useful attacks because the application rejects any input

containing whitespace. How can you work around this restriction?

6. The application is doubling up all single quotation marks within user

input before these are incorporated into SQL queries. You have found a

SQL injection vulnerability in a numeric field, but you need to use a

string value in one of your attack payloads. How can you place a string

into your query without using any quotation marks?

7. In some rare situations, applications construct dynamic SQL queries out

of user-supplied input in a way that cannot be made safe using parame-

terized queries. When does this occur?

8. You have escalated privileges within an application such that you now

have full administrative access. You discover a SQL injection vulnera-

bility within a user administration function. How can you leverage this

vulnerability to further advance your attack?

9. You are attacking an application that holds no sensitive data, and con-

tains no authentication or access control mechanisms. In this situation,

how should you rank the significance of the following vulnerabilities?

(a) SQL injection

(b) XPath injection

(c) OS command injection

10. You are probing an application function that enables you to search per-

sonnel details. You suspect that the function is accessing either a data-

base or an Active Directory back end. How could you try to determine

which of these is the case?


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   574   575   576   577   578   579   580   581   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish