19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

162 Chapter 6 n Attacking Au<strong>the</strong>ntication<br />

Figure 6-1: An <strong>application</strong> that enforces weak password quality rules<br />

HACK STEPS<br />

Attempt to discover any rules regarding password quality:<br />

1. Review <strong>the</strong> <strong>web</strong>site for any description of <strong>the</strong> rules.<br />

2. If self-registration is possible, attempt to register several accounts with<br />

different kinds of weak passwords to discover what rules are in place.<br />

3. If you control a single account and password change is possible, attempt<br />

to change your password to various weak values.<br />

NOTE If password quality rules are enforced only through client-side controls,<br />

this is not itself a security issue, because ordinary users will still be<br />

protected. It is not normally a threat to an <strong>application</strong>’s security that a crafty<br />

attacker can assign himself a weak password.<br />

TRY IT!<br />

http://mdsec.net/auth/217/<br />

Brute-Forcible Login<br />

Login functionality presents an open invitation for an attacker to try to guess<br />

usernames and passwords and <strong>the</strong>refore gain unauthorized access to <strong>the</strong> <strong>application</strong>.<br />

If <strong>the</strong> <strong>application</strong> allows an attacker to make repeated login attempts

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!