The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


this is, of course, vulnerable to interception



Download 5,76 Mb.
Pdf ko'rish
bet254/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   250   251   252   253   254   255   256   257   ...   875
Bog'liq
3794 1008 4334

this is, of course, vulnerable to interception.

■■

If no cases of actual credentials being transmitted insecurely are identi-



fied, pay close attention to any data that appears to be encoded or

obfuscated. If this includes sensitive data, it may be possible to reverse

engineer the obfuscation algorithm.

■■

If credentials are submitted using HTTPS but the login form is loaded



using HTTP, then the application is vulnerable to a man-in-the-middle

attack, which may be used to capture credentials.

Chapter 6 



Attacking Authentication



143

70779c06.qxd:WileyRed  9/14/07  3:13 PM  Page 143




Password Change Functionality

Surprisingly, many web applications do not provide any way for users to

change their password. However, this functionality is necessary for a well-

designed authentication mechanism for two reasons:

■■

Periodic enforced password change mitigates the threat of password



compromise by reducing the window in which a given password can be

targeted in a guessing attack and by reducing the window in which a

compromised password can be used without detection by the attacker.

■■

Users who suspect that their passwords may have been compromised



need to be able to quickly change their password to reduce the threat of

unauthorized use.

Although it is a necessary part of an effective authentication mechanism,

password change functionality is often vulnerable by design. It is frequently

the case that vulnerabilities that are deliberately avoided in the main login

function reappear in the password change function. There are many web

applications whose password change functions are accessible without authen-

tication and that:

■■

Provide a verbose error message indicating whether the requested user-



name is valid.

■■

Allow unrestricted guesses of the “existing password” field.



■■

Only check whether the “new password” and “confirm new password”

fields have the same value after validating the existing password,

thereby allowing an attack to succeed in discovering the existing pass-

word noninvasively.

HACK STEPS




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   250   251   252   253   254   255   256   257   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish