The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


which your data is appended lies deep within the file system, and so using an



Download 5,76 Mb.
Pdf ko'rish
bet591/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   587   588   589   590   591   592   593   594   ...   875
Bog'liq
3794 1008 4334

which your data is appended lies deep within the file system, and so using an

excessive number of sequences helps to avoid false negatives.

Also, the Windows platform tolerates both forward slashes and backslashes as

directory separators, whereas Unix-based platforms tolerate only the forward

slash. Further, some web applications filter one version but not the other. Even

if you are completely certain that the web server is running a Unix-based

operating systen, the application may still be calling out to a Windows-based

back-end component. Because of this, it is always advisable to try both

versions when probing for traversal flaws.

Circumventing Obstacles to Traversal Attacks

If your initial attempts to perform a traversal attack, as described previously,

are unsuccessful, this does not mean that the application is not vulnerable.

Many application developers are aware of path traversal vulnerabilities and

implement various kinds of input validation checks in an attempt to prevent

them. However, those defenses are often flawed and can be bypassed by a

skilled attacker.

The first type of input filter commonly encountered involves checking

whether the filename parameter contains any path traversal sequences, and if

so, either rejects the request or attempts to sanitize the input to remove the

sequences. This type of filter is often vulnerable to various attacks that use

alternative encodings and other tricks to defeat the filter. These attacks all

exploit the type of canonicalization problems faced by input validation mech-

anisms, as described in Chapter 2.



HACK STEPS




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   587   588   589   590   591   592   593   594   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish