19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 6 n Attacking Au<strong>the</strong>ntication 179<br />

<strong>the</strong> backdoor password and <strong>the</strong>refore gain access to every user’s account.<br />

Similarly, a brute-force attack might result in two different “hits,” <strong>the</strong>reby<br />

revealing <strong>the</strong> backdoor password, as shown in Figure 6-8.<br />

Figure 6-7: A vulnerable user impersonation function<br />

HACK STEPS<br />

1. Identify any impersonation functionality within <strong>the</strong> <strong>application</strong>. If this is<br />

not explicitly linked from published content, it may still be implemented<br />

(see Chapter 4).<br />

2. Attempt to use <strong>the</strong> impersonation functionality directly to impersonate<br />

o<strong>the</strong>r users.<br />

3. Attempt to manipulate any user-supplied data that is processed by <strong>the</strong><br />

impersonation function in an attempt to impersonate o<strong>the</strong>r users. Pay<br />

particular attention to any cases where your username is being submitted<br />

o<strong>the</strong>r than during normal login.<br />

4. If you succeed in making use of <strong>the</strong> functionality, attempt to impersonate<br />

any known or guessed administrative users to elevate privileges.<br />

5. When carrying out password-guessing attacks (see <strong>the</strong> “Brute-Forcible<br />

Login” section), review whe<strong>the</strong>r any users appear to have more than one<br />

valid password, or whe<strong>the</strong>r a specific password has been matched against<br />

several usernames. Also, log in as many different users with <strong>the</strong> credentials<br />

captured in a brute-force attack, and review whe<strong>the</strong>r everything appears<br />

normal. Pay close attention to any “logged in as X” status message.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!