The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet605/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   601   602   603   604   605   606   607   608   ...   875
Bog'liq
3794 1008 4334

The Nature of Logic Flaws

Logic flaws in web applications are extremely varied. They range from simple

bugs manifested in a handful of lines of code, to extremely complex vulnera-

bilities arising from the interoperation of several core components of the appli-

cation. In some instances, they may be obvious and trivial to detect; in other

cases, they may be exceptionally subtle and liable to elude even the most rig-

orous code review or penetration test.

Unlike other coding flaws such as SQL injection or cross-site scripting,

there is no common “signature” associated with logic flaws. The defining

characteristic, of course, is that the logic implemented within the application

is defective in some way. In many cases, the defect can be represented in

terms of a specific assumption that has been made in the thinking of the

designer or developer, either explicitly or implicitly, and that turns out to be

flawed. In general terms, a programmer may have reasoned something like

“If A happens, then B must be the case, so I will do C.” The programmer did

not ask the entirely different question “But what if X occurs?” and so failed

to take account of a scenario that violates the assumption. Depending on the

circumstances, this flawed assumption may open up a significant security

vulnerability.

As awareness of common web application vulnerabilities has increased in

recent years, the incidence and severity of some categories of vulnerability

have declined noticeably. However, because of the nature of logic flaws, it is

unlikely that they will ever be completely eliminated via standards for secure

development, use of code-auditing tools, or normal penetration testing. The

diverse nature of logic flaws, and the fact that detecting and preventing them

often requires a good measure of lateral thinking, suggests that they will be

prevalent for a good while to come. Any serious attacker, therefore, needs to

pay serious attention to the logic employed in the application being targeted,

to try to figure out the assumptions that designers and developers are likely to

have made, and then to think imaginatively about how those assumptions

may be violated.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   601   602   603   604   605   606   607   608   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish