19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

294<br />

Part V: Hacking Applications<br />

Default script attacks<br />

Poorly written web programs, such as Hypertext Preprocessor (PHP) and<br />

Active Server Pages (ASP) scripts, can allow hackers to view and manipulate<br />

files on a web server and do other things they’re not authorized to do. These<br />

flaws are also common in content management systems (CMSs) that are used<br />

by developers, IT staff, and marketing professionals to maintain a website’s<br />

content. Default script attacks are common because so much poorly written<br />

code is freely accessible on websites. Hackers can also take advantage of<br />

various sample scripts that install on web servers, especially older versions<br />

of Microsoft’s IIS web server.<br />

Many web developers and webmasters use these scripts without understanding<br />

how they really work or without testing them, which can introduce serious<br />

security vulnerabilities.<br />

To test for script vulnerabilities, you can peruse scripts manually or use a<br />

text search tool (such as the search function built in to the Windows Start<br />

menu or the Find program in Linux) to find any hard-coded usernames, passwords,<br />

and other sensitive information. Search for admin, root, user, ID, login,<br />

signon, password, pass, pwd, and so on. Sensitive information embedded in<br />

scripts like this is rarely necessary and is often the result of poor coding<br />

practices that give precedence to convenience over security.<br />

Countermeasures against<br />

default script attacks<br />

You can help prevent attacks against default web scripts as follows:<br />

✓ Know how scripts work before deploying them within a web environment.<br />

✓ Make sure that all default or sample scripts are removed from the web<br />

server before using them.<br />

Don’t use publicly accessible scripts that contain hard-coded confidential<br />

information. They’re a security incident in the making.<br />

✓ Set file permissions on sensitive areas of your site/application to prevent<br />

public access.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!