11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 2: <strong>Threats</strong> <strong>and</strong> Countermeasures 31Cookie Replay AttacksWith this type of attack, the attacker captures the user’s authentication cookie usingmonitoring software <strong>and</strong> replays it to the application to gain access under a falseidentity.Countermeasures to prevent cookie replay include:● Use an encrypted communication channel provided by SSL whenever anauthentication cookie is transmitted.● Use a cookie timeout to a value that forces authentication after a relatively shorttime interval. Although this doesn’t prevent replay attacks, it reduces the timeinterval in which the attacker can replay a request without being forced to reauthenticatebecause the session has timed out.Credential TheftIf your application implements its own user store containing user account names <strong>and</strong>passwords, compare its security to the credential stores provided by the platform, forexample, a Microsoft Active Directory® directory service or <strong>Security</strong> AccountsManager (SAM) user store. Browser history <strong>and</strong> cache also store user logininformation for future use. If the terminal is accessed by someone other than the userwho logged on, <strong>and</strong> the same page is hit, the saved login will be available.Countermeasures to help prevent credential theft include:● Use <strong>and</strong> enforce strong passwords.● Store password verifiers in the form of one way hashes with added salt.● Enforce account lockout for end-user accounts after a set number of retry attempts.●To counter the possibility of the browser cache allowing login access, createfunctionality that either allows the user to choose to not save credentials, or forcethis functionality as a default policy.AuthorizationBased on user identity <strong>and</strong> role membership, authorization to a particular resource orservice is either allowed or denied. Top threats that exploit authorizationvulnerabilities include:● Elevation of privilege● Disclosure of confidential data● Data tampering● Luring attacks

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!