The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 4  ■ Mapping the Application



Download 5,76 Mb.
Pdf ko'rish
bet148/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   144   145   146   147   148   149   150   151   ...   875
Bog'liq
3794 1008 4334

Chapter 4 



Mapping the Application



79

70779c04.qxd:WileyRed  9/14/07  3:12 PM  Page 79




Some key areas to investigate are:

■■

The core functionality of the application — the actions that it can be



leveraged to perform when used as intended.

■■

Other more peripheral behavior of the application, including off-site



links, error messages, administrative and logging functions, use of redi-

rects, and so on.

■■

The core security mechanisms and how they function, in particular



management of session state, access controls, and authentication mech-

anisms and supporting logic (user registration, password change,

account recovery, etc.).

■■

All of the different locations at which user-supplied input is processed



by the application — every URL, query string parameter, item of 

POST


data, cookie, and the like.

■■

The technologies employed on the client side, including forms, client-



side scripts, thick-client components (Java applets, ActiveX controls,

and Flash), and cookies.

■■

The technologies employed on the server side, including static and



dynamic pages, the types of request parameters employed, use of SSL,

web server software, interaction with databases, email systems and

other back-end components.

■■

Any other details that may be gleaned about the internal structure and



functionality of the server-side application — the mechanisms it uses

behind the scenes to deliver the functionality and behavior that is visi-

ble from the client perspective.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   144   145   146   147   148   149   150   151   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish