The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet16/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   12   13   14   15   16   17   18   19   ...   875
Bog'liq
3794 1008 4334

xxvi

Introduction

70779flast.qxd:WileyRed  9/14/07  3:12 PM  Page xxvi




the key tasks that you need to perform to carry out a comprehensive attack:

from mapping the application’s functionality, scrutinizing and attacking its

core defense mechanisms, to probing for specific categories of security flaws.

The book concludes with three chapters that pull together the various

strands introduced within the book. We describe the process of finding vul-

nerabilities in an application’s source code, review the tools that can assist you

when hacking web applications, and present a detailed methodology for per-

forming a comprehensive and deep attack against a specific target.

Chapter 1, “Web Application (In)security,” describes the current state of

security in web applications on the Internet today. Despite common assur-

ances, the majority of applications are insecure and can be compromised in

some way with a modest degree of skill. Vulnerabilities in web applications

arise because of a single core problem: users can submit arbitrary input. In this

chapter, we examine the key factors that contribute to the weak security pos-

ture of today’s applications, and describe how defects in web applications can

leave an organization’s wider technical infrastructure highly vulnerable to

attack.

Chapter 2, “Core Defense Mechanisms,” describes the key security mecha-

nisms that web applications employ to address the fundamental problem that

all user input is untrusted. These mechanisms are the means by which an

application manages user access, handles user input, and responds to attack-

ers, and the functions provided for administrators to manage and monitor the

application itself. The application’s core security mechanisms also represent

its primary attack surface, and you need to understand how these mechanisms

are intended to function before you can effectively attack them.

Chapter 3, “Web Application Technologies,” provides a short primer on the

key technologies that you are likely to encounter when attacking web applica-

tions. This covers all relevant aspects of the HTTP protocol, the technologies

commonly used on the client and server sides, and various schemes used for

encoding data. If you are already familiar with the main web technologies,

then you can quickly skim through this chapter.

Chapter 4, “Mapping the Application,” describes the first exercise that you

need to take when targeting a new application, which is to gather as much

information as possible about it, in order to map its attack surface and formu-

late your plan of attack. This process includes exploring and probing the appli-

cation to catalogue all of its content and functionality, identifying all of the

entry points for user input and discovering the technologies in use.

Chapter 5, Bypassing Client-Side Controls,” describes the first area of

actual vulnerability, which arises when an application relies upon controls

implemented on the client side for its security. This approach is normally

flawed, because any client-side controls can, of course, be circumvented. The

two main ways in which applications make themselves vulnerable are (a) to

transmit data via the client in the assumption that this will not be modified,


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   12   13   14   15   16   17   18   19   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish