The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 10  ■ Exploiting Path Traversal



Download 5,76 Mb.
Pdf ko'rish
bet602/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   598   599   600   601   602   603   604   605   ...   875
Bog'liq
3794 1008 4334

Chapter 10 



Exploiting Path Traversal



345

70779c10.qxd:WileyRed  9/14/07  3:14 PM  Page 345




directory is treated as if it is the file system root, and any redundant tra-

versal sequences that attempt to step up above it are ignored.

Chrooted

file systems are supported natively on most Unix-based plat-

forms. A similar effect can be achieved on Windows platforms (in rela-

tion to traversal vulnerabilities, at least) by mounting the relevant start

directory as a new logical drive and using the associated drive letter to

access its contents.

■■

The application should integrate its defenses against path traversal



attacks with its logging and alerting mechanisms. Whenever a request

is received that contains path traversal sequences, this indicates likely

malicious intent on the part of the user, and the application should log

the request as an attempted security breach, terminate the user’s ses-

sion, and if applicable, suspend the user’s account and generate an alert

to an administrator.



Chapter Summary

Path traversal can often be a devastating vulnerability, enabling you to break

through many layers of security controls to gain direct access to sensitive data,

including passwords, configuration files, application logs, and source code. If

the vulnerability grants write access, it can quickly lead to a complete com-

promise of the application and underlying server. 

Path traversal bugs are surprisingly common; however, they are often sub-

tle to detect and may be protected by various kinds of input validation which

deflect the most obvious attacks but can nevertheless be bypassed with skill

and determination. The most important lesson when probing for path traver-

sal flaws is to be patient and work systematically to try to understand pre-

cisely how your input is being handled, and how the server’s processing can

be manipulated to achieve success.

Questions

Answers can be found at 

www.wiley.com/go/webhacker

.

1. You insert a standard path traversal detection string into the 



following URL:

https://wahh-app.com/logrotate.pl?file=../../../../../etc/passwd




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   598   599   600   601   602   603   604   605   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish