19.09.2017 Views

the-web-application-hackers-handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 3 n Web Application Technologies 65<br />

n It modifies <strong>the</strong> core Ajax technology, XMLHttpRequest, to enable two-way<br />

cross-domain interaction in certain situations. This can lead to new crossdomain<br />

attacks, as described in Chapter 13.<br />

n It introduces new mechanisms for client-side data storage, which can lead<br />

to user privacy issues, and new categories of attack such as client-side SQL<br />

injection, as described in Chapter 13.<br />

“Web 2.0”<br />

This buzzword has become fashionable in recent years as a ra<strong>the</strong>r loose and<br />

nebulous name for a range of related trends in <strong>web</strong> <strong>application</strong>s, including <strong>the</strong><br />

following:<br />

n Heavy use of Ajax for performing asynchronous, behind-<strong>the</strong>-scenes requests<br />

n Increased cross-domain integration using various techniques<br />

n Use of new technologies on <strong>the</strong> client side, including XML, JSON, and Flex<br />

n More prominent functionality supporting user-generated content, information<br />

sharing, and interaction<br />

As with all changes in technology, <strong>the</strong>se trends present new opportunities<br />

for security vulnerabilities to arise. However, <strong>the</strong>y do not define a clear subset<br />

of <strong>web</strong> <strong>application</strong> security issues in general. The vulnerabilities that occur in<br />

<strong>the</strong>se contexts are largely <strong>the</strong> same as, or closely derived from, types of vulnerabilities<br />

that preceded <strong>the</strong>se trends. In general, talking about “Web 2.0 Security”<br />

usually represents a category mistake that does not facilitate clear thinking<br />

about <strong>the</strong> issues that matter.<br />

Browser Extension Technologies<br />

Going beyond <strong>the</strong> capabilities of JavaScript, some <strong>web</strong> <strong>application</strong>s employ<br />

browser extension technologies that use custom code to extend <strong>the</strong> browser’s<br />

built-in capabilities in arbitrary ways. These components may be deployed as<br />

bytecode that is executed by a suitable browser plug-in or may involve installing<br />

native executables onto <strong>the</strong> client computer itself. The thick-client technologies<br />

you are likely to encounter when attacking <strong>web</strong> <strong>application</strong>s are<br />

n Java applets<br />

n ActiveX controls<br />

n Flash objects<br />

n Silverlight objects<br />

These technologies are described in detail in Chapter 5.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!