11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents viiHow to Use This Chapter ........................................................................................... 14Anatomy of an Attack ................................................................................................ 14Survey <strong>and</strong> Assess ............................................................................................... 15Exploit <strong>and</strong> Penetrate ............................................................................................ 15Escalate Privileges................................................................................................ 15Maintain Access ................................................................................................... 16Deny Service ........................................................................................................ 16Underst<strong>and</strong>ing Threat Categories ............................................................................... 16STRIDE ................................................................................................................ 16STRIDE <strong>Threats</strong> <strong>and</strong> Countermeasures ................................................................... 17Network <strong>Threats</strong> <strong>and</strong> Countermeasures ...................................................................... 18Information Gathering............................................................................................ 18Sniffing ................................................................................................................ 19Spoofing .............................................................................................................. 19Session Hijacking ................................................................................................. 19Denial of Service .................................................................................................. 20Host <strong>Threats</strong> <strong>and</strong> Countermeasures ........................................................................... 20Viruses, Trojan Horses, <strong>and</strong> Worms ........................................................................ 21Footprinting .......................................................................................................... 21Password Cracking................................................................................................ 22Denial of Service .................................................................................................. 22Arbitrary Code Execution........................................................................................ 23Unauthorized Access............................................................................................. 23<strong>Application</strong> <strong>Threats</strong> <strong>and</strong> Countermeasures .................................................................. 23Input Validation......................................................................................................... 24Buffer Overflows ................................................................................................... 25Cross-Site Scripting............................................................................................... 26SQL Injection ........................................................................................................ 27Canonicalization ................................................................................................... 28Authentication .......................................................................................................... 29Network Eavesdropping ......................................................................................... 29Brute Force Attacks............................................................................................... 30Dictionary Attacks................................................................................................. 30Cookie Replay Attacks........................................................................................... 31Credential Theft .................................................................................................... 31Authorization ............................................................................................................ 31Elevation of Privilege ............................................................................................. 32Disclosure of Confidential Data.............................................................................. 32Data Tampering..................................................................................................... 32Luring Attacks....................................................................................................... 33Configuration Management........................................................................................ 33Unauthorized Access to Administration Interfaces ................................................... 33Unauthorized Access to Configuration Stores .......................................................... 34Retrieval of Plaintext Configuration Secrets............................................................. 34Lack of Individual Accountability ............................................................................. 34Over-privileged <strong>Application</strong> <strong>and</strong> Service Accounts..................................................... 34

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!