The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet68/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   64   65   66   67   68   69   70   71   ...   875
Bog'liq
3794 1008 4334

28

Chapter 2 



Core Defense Mechanisms

70779c02.qxd:WileyRed  9/14/07  3:12 PM  Page 28



presenting an uninformative error message. See Chapter 14 for more details of

these measures.

Effective error handling is often integrated with the application’s logging

mechanisms, which record as much debug information as possible about

unanticipated errors. Very often, unexpected errors point to defects within the

application’s defenses that can be addressed at the source if the application’s

owner has the required information.

Maintaining Audit Logs

Audit logs are primarily of value when investigating intrusion attempts against

an application. Following such an incident, effective audit logs should enable

the application’s owners to understand exactly what has taken place, which

vulnerabilities (if any) were exploited, whether the attacker gained unautho-

rized access to data or performed any unauthorized actions, and as far as pos-

sible, provide evidence as to the intruder’s identity.

In any application for which security is important, key events should be

logged as a matter of course. At a minimum, these typically include:

■■

All events relating to the authentication functionality, such as successful



and failed login, and change of password.

■■

Key transactions, such as credit card payments and funds transfers.



■■

Access attempts that are blocked by the access control mechanisms.

■■

Any requests containing known attack strings that indicate overtly



malicious intentions.

In many security-critical applications, such as those used by online banks,

every single client request is logged in full, providing a complete forensic

record that can be used to investigate any incidents.

Effective audit logs typically record the time of each event, the IP address

from which the request was received, the session token, and the user’s account

(if authenticated). Such logs need to be strongly protected against unautho-

rized read or write access. An effective approach is to store audit logs on an

autonomous system that accepts only update messages from the main appli-

cation. In some situations, logs may be flushed to write-once media to ensure

their integrity in the event of a successful attack.

In terms of attack surface, poorly protected audit logs can provide a gold

mine of information to an attacker, disclosing a host of sensitive information

such as session tokens and request parameters that may enable them to imme-

diately compromise the entire application (see Figure 2-7).


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   64   65   66   67   68   69   70   71   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish