The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet63/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   59   60   61   62   63   64   65   66   ...   875
Bog'liq
3794 1008 4334

24

Chapter 2 



Core Defense Mechanisms

70779c02.qxd:WileyRed  9/14/07  3:12 PM  Page 24



2. The application performs an SQL query to verify the user’s credentials.

To prevent SQL injection attacks, any characters within the user input

that may be used to attack the database are escaped before the query is

constructed.

3. If the login succeeds, the application passes certain data from the user’s

profile to a SOAP service to retrieve further information about her

account. To prevent SOAP injection attacks, any XML metacharacters

within the user’s profile data are suitably encoded.

4. The application displays the user’s account information back to the

user’s browser. To prevent cross-site scripting attacks, the application

HTML-encodes any user-supplied data that is embedded into the

returned page.



Figure 2-5: An application function using boundary validation at multiple stages of

processing

The specific vulnerabilities and defenses involved in the described scenario

will be examined in detail in later chapters. If variations on this functionality

involved passing data to further application components, then similar

defenses would need to be implemented at the relevant trust boundaries. For

example, if a failed login caused the application to send a warning email to the

user, then any user data incorporated into the email may need to be checked

for SMTP injection attacks. 

1. General checks 

Login submission 

2. Clean SQL 

SQL query 

Database 

Display account 

details 


3. Encode XML 

metacharacters 

4. Sanitize output 

Application 

server 

SOAP 


message 

SOAP service 

User 


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   59   60   61   62   63   64   65   66   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish