The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


tion layer, but you may still have limited access to the database and



Download 5,76 Mb.
Pdf ko'rish
bet422/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   418   419   420   421   422   423   424   425   ...   875
Bog'liq
3794 1008 4334

tion layer, but you may still have limited access to the database and

operating system.



A single exploitable access control vulnerability in the right location may



still provide a starting point for serious privilege escalation. For example,

if you discover a way to modify the role associated with your account,

then you may find that logging in again with that account gives you

enhanced access at both the application and database layers.

Chapter Summary

Access control defects can manifest themselves in various ways. In some cases,

they may be uninteresting, allowing illegitimate access to a harmless function

that cannot be leveraged to escalate privileges any further. In other cases, find-

ing a weakness in access controls can quickly lead to a complete compromise

of the application.

Flaws in access control can arise from various sources: a poor application

design may make it difficult or impossible to check for unauthorized access, a

simple oversight may leave only one or two functions unprotected, or defec-

tive assumptions about the way users will behave can leave the application

undefended when those assumptions are violated.

In many cases, finding a break in access controls is almost trivial — you sim-

ply request a common administrative URL and gain direct access to the func-

tionality. In other cases, it may be very hard, and subtle defects may lurk deep

within application logic, particularly in complex, high-security applications.

The most important lesson when attacking access controls is to look every-

where. If you are struggling to make progress, be patient and test every single

step of every application function. A bug that allows you to own the entire

application may be just around the corner.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   418   419   420   421   422   423   424   425   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish