11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

20 Part I: Introduction to <strong>Threats</strong> <strong>and</strong> CountermeasuresCountermeasures to help prevent session hijacking include:● Use encrypted session negotiation.● Use encrypted communication channels.● Stay informed of platform patches to fix TCP/IP vulnerabilities, such aspredictable packet sequences.Denial of ServiceDenial of service denies legitimate users access to a server or services. The SYN floodattack is a common example of a network level denial of service attack. It is easy tolaunch <strong>and</strong> difficult to track. The aim of the attack is to send more requests to a serverthan it can h<strong>and</strong>le. The attack exploits a potential vulnerability in the TCP/IPconnection establishment mechanism <strong>and</strong> floods the server’s pending connectionqueue.Countermeasures to prevent denial of service include:● Apply the latest service packs.● Harden the TCP/IP stack by applying the appropriate registry settings to increasethe size of the TCP connection queue, decrease the connection establishmentperiod, <strong>and</strong> employ dynamic backlog mechanisms to ensure that the connectionqueue is never exhausted.● Use a network Intrusion Detection System (IDS) because these can automaticallydetect <strong>and</strong> respond to SYN attacks.Host <strong>Threats</strong> <strong>and</strong> CountermeasuresHost threats are directed at the system software upon which your applications arebuilt. This includes Windows 2000, Internet Information Services (IIS), the .NETFramework, <strong>and</strong> SQL Server 2000, depending upon the specific server role. Top hostlevel threats include:● Viruses, Trojan horses, <strong>and</strong> worms● Footprinting● Profiling● Password cracking● Denial of service● Arbitrary code execution● Unauthorized access

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!