The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 14  ■ Exploiting Information Disclosure



Download 5,76 Mb.
Pdf ko'rish
bet865/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   861   862   863   864   865   866   867   868   ...   875
Bog'liq
3794 1008 4334

Chapter 14 



Exploiting Information Disclosure



517

70779c14.qxd:WileyRed  9/14/07  3:14 PM  Page 517




Chapter Summary

Leakage of unnecessary information frequently does not present any kind of

significant defect in an application’s security. Even highly verbose stack traces

and other debugging messages may sometimes provide you with little lever-

age in seeking to attack the application.

In other cases, however, you may discover sources of information that are of

great value in developing your attack — for example, by providing you with

lists of usernames, the precise versions of software components, or disclosing

the internal structure and functionality of the server-side application logic.

Because of this possibility, any serious assault on an application should

include a forensic examination of both the application itself and publicly avail-

able resources, to gather any information that may be of use in formulating

your attacks against it. On some occasions, information gathered in this way

can provide the foundation for a complete compromise of the application that

disclosed it. 

Questions

Answers can be found at 

www.wiley.com/go/webhacker

.

1. While probing for SQL injection vulnerabilities, you request the follow-



ing URL:

https://wahh-app.com/list.aspx?artist=foo’+having+1%3d1--

and receive the following error message:

Server: Msg 170, Level 15, State 1, Line 1

Line 1: Incorrect syntax near ‘having1’.

What can you infer from this? Does the application contain any

exploitable condition?

2. While you are performing fuzz testing of various parameters, an appli-

cation returns the following error message:

Warning: mysql_connect() [function.mysql-connect]: Access denied for

user ‘premiumdde’@‘localhost’ (using password: YES) in

/home/doau/public_html/premiumdde/directory on line 15

Warning: mysql_select_db() [function.mysql-select-db]: Access denied

for user ‘nobody’@‘localhost’ (using password: NO) in

/home/doau/public_html/premiumdde/directory on line 16

Warning: mysql_select_db() [function.mysql-select-db]: A link to the

server could not be established in


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   861   862   863   864   865   866   867   868   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish