The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 12  ■ Attacking Other Users



Download 5,76 Mb.
Pdf ko'rish
bet801/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   797   798   799   800   801   802   803   804   ...   875
Bog'liq
3794 1008 4334

Chapter 12 



Attacking Other Users



469

70779c12.qxd:WileyRed  9/14/07  3:14 PM  Page 469




6. How does the browser’s same origin policy impinge upon the use of

the Ajax technology 

XMLHttpRequest

?

7. Name three possible attack payloads for XSS exploits (that is, the mali-



cious actions that you can perform within another user’s browser, not

the methods by which you deliver the attacks).

8. You discover a function which copies the value of some user-supplied

data into the target of an image tag:

The data is stored within the application and will be returned to other



authenticated users who view the relevant page. The application is

HTML-encoding the 



<

and 


>

characters, preventing you from breaking

out of the image tag. What two categories of attack can you perform?

9. You have discovered a reflected XSS vulnerability where you can inject

arbitrary data into a single location within the HTML of the returned

page. The data inserted is truncated to 50 bytes, but you want to inject a

lengthy script. You prefer not to call out to a script on an external

server. How can you work around the length limit?

10. You discover a reflected XSS flaw in a request that must use the 

POST


method. What delivery mechanisms are feasible for performing an attack?

11. How can an attacker make use of the 

TRACE

method to facilitate an XSS



attack?

12. You discover an application function where the contents of a query

string parameter are inserted into the 

Location


header in an HTTP redi-

rect. What three different types of attacks can this behavior potentially

be exploited to perform?

13. Your very first request to a banking application returns HTML like the

following: 









What vulnerability can you immediately diagnose here, without per-

forming any further testing?

14. What is the main precondition that must exist to enable an XSRF attack

against a sensitive function of an application?

15. What three defensive measures can each be used to prevent JSON

hijacking attacks?


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   797   798   799   800   801   802   803   804   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish