The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


session. If the application’s session management is flawed, then an attacker



Download 5,76 Mb.
Pdf ko'rish
bet311/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   307   308   309   310   311   312   313   314   ...   875
Bog'liq
3794 1008 4334

session. If the application’s session management is flawed, then an attacker

can bypass the robust authentication altogether and still compromise users.

The Need for State

The HTTP protocol is essentially stateless. It is based on a simple request-

response model, in which each pair of messages represents an independent

transaction. The protocol itself contains no mechanism for linking together the

series of requests made by one particular user and distinguishing these from

all of the other requests received by the web server. In the early days of the

Web, there was no need for any such mechanism: web sites were used to pub-

lish static HTML pages for anyone to view. Today, things are very different.

The majority of web “sites” are in fact web applications. They allow you to

register and log in. They let you buy and sell goods. They remember your pref-

erences next time you visit. They deliver rich, multimedia experiences with

content created dynamically based on what you click and type. In order to

implement any of this functionality, web applications need to use the concept

of a session.

The most obvious use of sessions is in applications that support logging in.

After entering your username and password, you can go ahead and use the

application as the user whose credentials you have entered, until such time as

you log out or the session expires due to inactivity. Users do not want to have

to reenter their password on every single page of the application. Hence, after

authenticating the user once, the application creates a session for them, and

treats all requests belonging to that session as coming from that user.

Applications that do not have a login function also typically need to use ses-

sions. Many sites selling merchandise do not require customers to create

accounts. However, they allow users to browse the catalog, add items to a

shopping basket, provide delivery details, and make payment. In this sce-

nario, there is no need to authenticate the identity of the user: for the majority




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   307   308   309   310   311   312   313   314   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish