The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 2  ■ Core Defense Mechanisms



Download 5,76 Mb.
Pdf ko'rish
bet52/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   48   49   50   51   52   53   54   55   ...   875
Bog'liq
3794 1008 4334

Chapter 2 



Core Defense Mechanisms



17

70779c02.qxd:WileyRed  9/14/07  3:12 PM  Page 17




token, the browser automatically submits this back to the server in each sub-

sequent HTTP request, enabling the application to associate the request with

that user. HTTP cookies are the standard method for transmitting session

tokens, although many applications use hidden form fields or the URL query

string for this purpose. If a user does not make a request for a given period,

then the session is ideally expired, as in Figure 2-2.

In terms of attack surface, the session management mechanism is highly

dependent on the security of its tokens, and the majority of attacks against it

seek to compromise the tokens issued to other users. If this is possible, an

attacker can masquerade as the victim user and use the application just as if

they had actually authenticated as that user. The principal areas of vulnerabil-

ity arise from defects in the way tokens are generated, enabling an attacker to

guess the tokens issued to other users, and defects in the way tokens are sub-

sequently handled, enabling an attacker to capture other users’ tokens.



Figure 2-2: An application enforcing session timeout

A small number of applications dispense with the need for session tokens by

using other means of re-identifying users across multiple requests. If HTTP’s

built-in authentication mechanism is used, then the browser automatically

resubmits the user’s credentials with each request, enabling the application to

identify the user directly from these. In other cases, the application stores the

state information on the client side rather than the server, usually in encrypted

form to prevent tampering.



Access Control

The final logical step in the process of handling user access is to make and

enforce correct decisions regarding whether each individual request should be

permitted or denied. If the preceding mechanisms are functioning correctly,

the application knows the identity of the user from whom each request is

received. On this basis, it needs to decide whether that user is authorized to

perform the action, or access the data, that he is requesting (see Figure 2-3).

The access control mechanism usually needs to implement some fine-

grained logic, with different considerations being relevant to different areas of


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   48   49   50   51   52   53   54   55   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish