The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet43/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   39   40   41   42   43   44   45   46   ...   875
Bog'liq
3794 1008 4334

The New Security Perimeter

Before the rise of web applications, organizations’ efforts to secure themselves

against external attack were largely focused on the network perimeter. Defend-

ing this perimeter entailed hardening and patching the services that it needed

to expose, and firewalling access to others.

10

Chapter 1 



Web Application (In)security

70779c01.qxd:WileyRed  9/14/07  3:12 PM  Page 10



Web applications have changed all of this. For an application to be accessi-

ble by its users, the perimeter firewall must allow inbound connections to the

server over HTTP/S. And for the application to function, the server must be

allowed to connect to supporting back-end systems, such as databases, main-

frames, and financial and logistical systems. These systems often lie at the core

of the organization’s operations and reside behind several layers of network-

level defenses.

If a vulnerability exists within a web application, then an attacker on the

public Internet may be able to compromise the organization’s core back-end

systems solely by submitting crafted data from his web browser. This data will

sail past all of the organization’s network defenses, in just the same way as

does ordinary, benign traffic to the web application.

The effect of widespread deployment of web applications is that the security

perimeter of a typical organization has moved. Part of that perimeter is still

embodied in firewalls and bastion hosts. But a significant part of it is now

occupied by the organization’s web applications. Because of the manifold

ways in which web applications receive user input and pass this to sensitive

back-end systems, they are the potential gateways for a wide range of attacks,

and defenses against these attacks must be implemented within the applica-

tions themselves. A single line of defective code in a single web application can

render an organization’s internal systems vulnerable. The statistics described

previously, of the incidence of vulnerabilities within this new security perime-

ter, should give every organization pause for thought.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   39   40   41   42   43   44   45   46   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish