HACK STEPS
■
Review the results of your application mapping exercises (see Chapter 4)
to identify all server-side functionality and client-side data that may be
used to obtain useful information.
■
Identify any locations within the application where sensitive data such as
passwords or credit card details are transmitted back from the server to
the browser. Even if these are masked on-screen, they are still of course
viewable within the server’s response. If you have found another suit-
able vulnerability, for example within access controls or session han-
Do'stlaringiz bilan baham: