19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 14: Websites and Applications<br />

✓ Use CAPTCHA (also reCAPTCHA) or web login forms to help prevent<br />

password-cracking attempts.<br />

✓ Employ an intruder lockout mechanism on your web server or within<br />

your web applications to lock user accounts after 10–15 failed login<br />

attempts. This chore can be handled via session tracking or via a thirdparty<br />

web application firewall add-on like I discuss in the later section<br />

“Putting up firewalls.”<br />

✓ Check for and change any vendor default passwords to something that’s<br />

easy to remember yet difficult to crack.<br />

Web 2.0 is changing how the Internet is used.<br />

From YouTube to Facebook to Twitter, new<br />

server and client-side technologies, such as<br />

web services, Ajax, and Flash, are being rolled<br />

out as if they’re going out of style. And these<br />

aren’t just consumer technologies. Businesses<br />

see the value in them, and developers are<br />

excited to utilize the latest and greatest technologies<br />

in their environments.<br />

Unfortunately, the downside to Web 2.0 is<br />

complexity. These new rich Internet applications,<br />

as many call them, are so complex that<br />

developers, quality assurance analysts, and<br />

security managers are struggling to keep up<br />

with all their associated security issues. Don’t<br />

get me wrong, the vulnerabilities in Web 2.0<br />

applications are very similar to what show up<br />

with legacy technologies, such as XSS, SQL<br />

injection, parameter manipulation, and so on.<br />

The problem is that automated web vulnerability<br />

scanners aren’t quite mature enough — at<br />

least as of this writing — to find all the security<br />

weaknesses that count. When assessing the<br />

security of Web 2.0 applications, I find that most<br />

Hacking Web 2 .0<br />

of them have to be analyzed manually. I’m sure<br />

that will change as tool vendors improve things.<br />

In the meantime, here are some valuable tools<br />

you can use to test for flaws in your Web 2.0<br />

applications:<br />

✓ Firefox Web Developer (http://<br />

chrispederick.com/work/<br />

web-developer) for analyzing script<br />

code and performing other manual checks.<br />

✓ SWFScan (http://bit.ly/ShyhVz)<br />

for decompiling and analyzing Shockwave<br />

Flash (.swf) files.<br />

✓ WSDigger (www.mcafee.com/us/<br />

downloads/free-tools/ws<br />

digger.aspx) for analyzing web services.<br />

✓ WSFuzzer (www.owasp.org/index.<br />

php/Category:OWASP_WSFuzzer_<br />

Project) for analyzing web services.<br />

Web 2.0 applications are here to stay, so try to get<br />

your arms around their security issues now before<br />

the technology grows even more complex.<br />

299

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!