The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 12  ■ Attacking Other Users



Download 5,76 Mb.
Pdf ko'rish
bet795/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   791   792   793   794   795   796   797   798   ...   875
Bog'liq
3794 1008 4334

Chapter 12 



Attacking Other Users

465

70779c12.qxd:WileyRed  9/14/07  3:14 PM  Page 465




such as session tokens, are not transmitted. This means that the content

retrieved in the attack will be the same as if the attacker had simply visited

http://wahh-app.com/

directly himself.

So what does the attack achieve? It is effective in retrieving content from

web sites which the user can access but which the attacker cannot. If the user

is on a corporate LAN, the attacker will be able to browse intranet sites on the

LAN. If the user is on a home DSL connection, the attacker will be able to com-

municate with the administrative interface on their router, which listens only

on the internal home network. The attacker can also interact with any web-

based services on the user’s own computer, even if these are protected by a

personal firewall. In these situations, the attacker can reach servers that are

defended by the network topology rather than by authentication and sessions.

A sophisticated attack could turn the user’s browser into an open proxy, allow-

ing the attacker to capture data from, and perform arbitrary actions against,

arbitrary targets. In many contexts, this could be a very serious threat.



DNS Pinning

It is specifically to prevent this kind of attack that DNS pinning exists. When

browsers resolve a domain name to an IP address, they cache the IP address

for the duration of the current browser session, regardless of the TTL value

specified in the response to the lookup. Hence, in step 5 of the hypothetical

attack, the browser will continue to associate 

wahh-attacker.com

with the


original IP address 

1.2.3.4


, and so does not make any request to the server at

wahh-app.com

. So the attack was only hypothetical after all. 


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   791   792   793   794   795   796   797   798   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish