The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet682/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   678   679   680   681   682   683   684   685   ...   875
Bog'liq
3794 1008 4334

Attack Other Network Hosts

Following a successful port scan to identify other hosts, a malicious script can

attempt to fingerprint each discovered service and then attack it in various

ways. Many web servers contain image files located at unique URLs. The fol-

lowing code checks for a specific image associated with a popular range of

DSL routers:

If the function 



notNetgear

is not invoked, then the server has been success-

fully fingerprinted. The script can then proceed to attack the web server, either

by exploiting any known vulnerabilities in the particular software, or by per-

forming a request forgery attack (described later in this chapter). In this exam-

ple, the attacker could attempt to reconfigure the router to open up additional

ports on its external interface, or expose its administrative function to the

world. Note that many highly effective attacks of this kind only require the

ability to issue arbitrary requests, not to process their responses, and so are not

affected by the browser’s same origin policy.

In certain situations, an attacker may be able to leverage anti-DNS pinning

techniques to violate the same origin policy and actually retrieve content from

web servers on the local network. These attacks are described later in this

chapter.


Going beyond attacks against web servers, Wade Alcorn has performed

some interesting research demonstrating the possibilities for attacking other

network services via a hijacked browser. See the following paper for more

details: 

www.ngssoftware.com/research/papers/InterProtocolExploitation.pdf


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   678   679   680   681   682   683   684   685   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish