19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In This Chapter<br />

Chapter 14<br />

Websites and Applications<br />

▶ Testing websites and web applications<br />

▶ Hacking with Google<br />

▶ Protecting against SQL injection and cross-site scripting<br />

▶ Preventing login weaknesses<br />

▶ Countering web abuse<br />

▶ Analyzing the source code<br />

W ebsites and web applications are common targets for attack because<br />

they’re everywhere and often open for anyone to poke and prod.<br />

Basic websites used for marketing, contact information, document downloads,<br />

and so on are especially easy for the bad guys to play around with.<br />

However, for criminal hackers, websites that provide a front end to complex<br />

applications and databases that store valuable information, such as credit<br />

card and Social Security numbers, are especially attractive. This is where the<br />

money is, both literally and figuratively.<br />

Why are websites and applications so vulnerable? The consensus is that they’re<br />

vulnerable because of poor software development and testing practices. Sound<br />

familiar? It should; this same problem affects operating systems and practically<br />

all aspects of computer systems. This is the side effect of relying on software<br />

compilers to perform error checking, waning user demand for higher-quality<br />

software, and emphasizing time-to-market instead of security and quality.<br />

This chapter presents website and application tests to run on your systems.<br />

Given all the custom software configuration possibilities, you can test for literally<br />

thousands of web vulnerabilities. In this chapter, I focus on the ones I see most<br />

often using both automated scanners and manual analysis. I also outline countermeasures<br />

to help minimize the chances that someone with ill intent can carry<br />

out these attacks against what are likely considered your most critical systems.<br />

I want to point out that this chapter merely skims the surface of all possible<br />

web security flaws and ways to test for them. Additional sources for building<br />

your web security testing skills are the tools and standards (such as the Top<br />

10 Web Application Security Risks) provided by the Open Web Application<br />

Security Project (www.owasp.org).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!