11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 2: <strong>Threats</strong> <strong>and</strong> Countermeasures 15Survey <strong>and</strong>AssessExploit <strong>and</strong>PenetrateEscalate PrivilegesMaintain AccessDeny ServiceFigure 2.1Basic steps for attacking methodologySurvey <strong>and</strong> AssessSurveying <strong>and</strong> assessing the potential target are done in t<strong>and</strong>em. The first step anattacker usually takes is to survey the potential target to identify <strong>and</strong> assess itscharacteristics. These characteristics may include its supported services <strong>and</strong> protocolstogether with potential vulnerabilities <strong>and</strong> entry points. The attacker uses theinformation gathered in the survey <strong>and</strong> assess phase to plan an initial attack.For example, an attacker can detect a cross-site scripting (XSS) vulnerability bytesting to see if any controls in a <strong>Web</strong> page echo back output.Exploit <strong>and</strong> PenetrateHaving surveyed a potential target, the next step is to exploit <strong>and</strong> penetrate. If thenetwork <strong>and</strong> host are fully secured, your application (the front gate) becomes the nextchannel for attack.For an attacker, the easiest way into an application is through the same entrance thatlegitimate users use — for example, through the application’s logon page or a pagethat does not require authentication.Escalate PrivilegesAfter attackers manage to compromise an application or network, perhaps byinjecting code into an application or creating an authenticated session with theMicrosoft ® Windows ® 2000 operating system, they immediately attempt to escalateprivileges. Specifically, they look for administration privileges provided by accountsthat are members of the Administrators group. They also seek out the high level ofprivileges offered by the local system account.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!