Identifying Attack Vectors
Professor Larry Heimann Web Application Security Information Systems
Identifying Attack Vectors Professor Larry Heimann Web Application - - PowerPoint PPT Presentation
Identifying Attack Vectors Professor Larry Heimann Web Application Security Information Systems Nothing is in isolation Attack surface An attack surface is the total number of possible attack vectors Think of a house, with the
Professor Larry Heimann Web Application Security Information Systems
intruders
Some apps don’t use URLs to individuate content and functions:
POST /bank.jsp HTTP/1.1 Host: wahh-bank.com Content-Length: 106 servlet=TransferFunds&method=confirmTransfer &fromAccount=10372918&toAccount=3910852&amou nt=291.23&Submit=Ok
/dir/file=bar/file /dir/file?param=foo:bar /dir/file?data=%3cfoo%3ebar%3c%2ffoo2%3ebar2%3c%2c
http://target/workflow/calendar.jsp?name=new %20applicants&isExpired=0&startDate=22%2F09%2F2006 &endDate=22%2F03%2F2007&OrderBy=name
.Net
http://target/workbench/register.aspx? template=NewBranch.tpl&loc=/ default&ver=5.32&edit=false
Vector Attack Method Database interaction SQL injection File upload/download path traversal vulnerability Display of user-supplied data cross-site scripting Dynamic redirects header injection attacks Login username enumeration, weak passwords, ability to use brute force Error messages information leakage Email interaction command injection Native code components buffer overflows Third-party application components known vulnerabilities