19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

292<br />

Part V: Hacking Applications<br />

Figure 14-8:<br />

Using<br />

Acunetix<br />

Web<br />

Vulnerability<br />

Scanner<br />

to find<br />

cross-site<br />

scripting in<br />

a web<br />

application.<br />

Another web vulnerability scanner that’s very good at uncovering XSS that<br />

many other scanners won’t find is NTOSpider from NT Objectives (www.<br />

ntobjectives.com). In my experience, NTOSpider works better than other<br />

scanners at performing authenticated scans against applications that use<br />

multi-factor authentication systems. NTOSpider should definitely be on your<br />

radar as a potential primary or secondary scanner. Remember: When it comes<br />

to web vulnerabilities, the more scanners the better!<br />

Countermeasures against input attacks<br />

Websites and applications must filter incoming data. It’s as simple as that.<br />

The sites and applications must check and ensure that the data entered fits<br />

within the parameters of what the application is expecting. If the data doesn’t<br />

match, the application should generate an error or return to the previous<br />

page. Under no circumstances should the application accept the junk data,<br />

process it, and reflect it back to the user.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!