The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 3  ■ Web Application Technologies



Download 5,76 Mb.
Pdf ko'rish
bet109/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   105   106   107   108   109   110   111   112   ...   875
Bog'liq
3794 1008 4334

Chapter 3 



Web Application Technologies



57

70779c03.qxd:WileyRed  9/14/07  3:12 PM  Page 57




In addition, any character can be HTML-encoded using its ASCII code in

decimal form, for example:

"   “

'   ‘

or by using its ASCII code in hexadecimal form (prefixed by an 

x

), for example:



"  “

'  ‘

When you are attacking a web application, your main interest in HTML

encoding is likely to be when probing for cross-site scripting vulnerabilities. If

an application returns user input unmodified within its responses, then it is

probably vulnerable, whereas if dangerous characters are HTML-encoded

then it is probably safe. See Chapter 12 for more details of these vulnerabilities.

Base64 Encoding

Base64 encoding allows any binary data to be safely represented using only

printable ASCII characters. It is commonly used for encoding email attach-

ments for safe transmission over SMTP, and is also used to encode user cre-

dentials in basic HTTP authentication.

Base64 encoding processes input data in blocks of three bytes. Each of these

blocks is divided into four chunks of six bits each. Six bits of data allow for 64

different possible permutations, and so each chunk can be represented using a

set of 64 characters. Base64 encoding employs the following character set,

which contains only printable ASCII characters:

ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/

If the final block of input data results in less than three chunks of output

data, then the output is padded with one or two 

=

characters.



For example, the Base64-encoded form of The Web Application Hacker’s Hand-

book is:

VGhlIFdlYiBBcHBsaWNhdGlvbiBIYWNrZXIncyBIYW5kYm9vaw==

Many web applications make use of Base64 encoding for transmitting

binary data within cookies and other parameters, and even for obfuscating

sensitive data to prevent trivial modification. You should always look out for,

and decode, any Base64 data that is issued to the client. Base64-encoded

strings can often be easily recognized from their specific character set and the

presence of padding characters at the end of the string.




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   105   106   107   108   109   110   111   112   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish