|
Table of Contents..from the Second Edition 1 Hacking Web Apps 101What Is Web Application Hacking?GUI Web HackingURI HackingMethods, Headers, and BodyResourcesAuthentication, Sessions, and AuthorizationThe Web Client and HTMLOther ProtocolsWhy Attack Web Applications?Who, When, and Where?Weak SpotsHow Are Web Apps Attacked?The Web BrowserBrowser ExtensionsHTTP ProxiesCommand-line ToolsOlder Tools2 ProfilingInfrastructure ProfilingFootprinting and Scanning: Defining ScopeBasic Banner GrabbingAdvanced HTTP FingerprintingInfrastructure IntermediariesApplication ProfilingManual InspectionUsing Search Tools for ProfilingAutomated Web CrawlingCommon Web Application ProfilesGeneral CountermeasuresA Cautionary NoteProtecting DirectoriesProtecting include FilesMiscellaneous Tips3 Hacking Web PlatformsPoint-and-click Exploitation Using MetasploitManual ExploitationEvading DetectionWeb Platform Security Best PracticesCommon Best PracticesIIS HardeningApache HardeningPHP Best Practices4 Attacking Web AuthenticationWeb Authentication ThreatsUsername/Password ThreatsStrong(er) Web AuthenticationWeb Authentication ServicesBypassing AuthenticationToken ReplayIdentity ManagementClient-side PiggybackingSome Final Thoughts: Identity Theft5 Attacking Web AuthorizationFingerprinting AuthzCrawling ACLsIdentifying Access/Session TokensAnalyzing Session TokensDifferential AnalysisRole MatrixAttacking ACLsAttacking TokensManual PredictionAutomated PredictionCapture/ReplaySession FixationAuthorization Attack Case StudiesHorizontal Privilege EscalationVertical Privilege EscalationDifferential AnalysisUsing Curl to Map PermissionsAuthorization Best PracticesWeb ACL Best PracticesWeb Authorization/Session Token SecuritySecurity Logs6 Input Validation AttacksExpect the UnexpectedWhere to Find Attack VectorsBypass Client-side Validation RoutinesCommon Input Validation AttacksBuffer OverflowCanonicalization (dot-dot-slash)HTML InjectionBoundary ChecksManipulate Application BehaviorSQL Injection and Datastore AttacksCommand ExecutionEncoding AbusePHP Global VariablesCommon Side-effects7 Attacking Web DatastoresSQL PrimerSyntaxSELECT, INSERT, and UPDATESQL Injection DiscoverySyntax and ErrorsSemantics and BehaviorAlternate Character EncodingExploit SQL Injection VulnerabilitiesAlter a ProcessQuery Alternate DataPlatformsOther Datastore AttacksInput ValidationDecouple Query Logic from Query DataDatabase EncryptionDatabase Configuration8 Attacking XML Web ServicesWhat Is a Web Service?Transport: SOAP Over HTTP(S)WSDLDirectory Services: UDDI and DISCOSimilarities to Web Application SecurityAttacking Web ServicesWeb Service Security BasicsWeb Services Security Measures9 Attacking Web Application ManagementRemote Server ManagementTelnetSSHProprietary Management PortsOther Administration ServicesWeb Content ManagementFTPSSH/scpFrontPageWebDAVAdmin MisconfigurationsUnnecessary Web Server ExtensionsInformation LeakageDeveloper-driven Mistakes10 Hacking Web ClientsExploitsTrickeryGeneral CountermeasuresIE Security ZonesFirefox Secure ConfigurationLow-privilege BrowsingServer-side Countermeasures11 Denial-of-Service (DoS) AttacksCommon DoS Attack TechniquesOld School DoS: VulnerabilitiesModern DoS: Capacity DepletionApplication-layer DoSGeneral DoS CountermeasuresProactive DoS MitigationDetecting DoSResponding to DoS12 Full-Knowledge AnalysisThreat ModelingClarify Security ObjectivesIdentify AssetsArchitecture OverviewDecompose the ApplicationIdentify and Document ThreatsRank the ThreatsDevelop Threat Mitigation StrategiesCode ReviewManual Source Code ReviewAutomated Source Code ReviewBinary AnalysisSecurity Testing of Web App CodeFuzzingTest Tools, Utilities, and HarnessesPen-testingSecurity in the Web Development ProcessPeopleProcessTechnology13 Web Application Security ScannersTechnology: Web App Security ScannersThe TestbedThe TestsReviews of Individual ScannersOverall Test ResultsNon-technical IssuesProcessPeopleAppendicesA Web Application Security ChecklistB Web Hacking Tools and Techniques CribsheetC URLScan and ModSecurityURLScanBasic URLScan Deployment (IIS5.x and Earlier)Advanced URLScan ConfigurationManaging URLScanModSecurityModSecurity InstallationModSecurity ConfigurationD About the Companion Web Site
|
|
|
Copyright © 2003. All Rights Reserved. Designed by HTMLfx |