19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 6 n Attacking Au<strong>the</strong>ntication 203<br />

(b) If <strong>the</strong>se details are correct, <strong>the</strong> <strong>application</strong> shows <strong>the</strong> user her chosen<br />

image; o<strong>the</strong>rwise, a random image is displayed.<br />

(c) The user verifies whe<strong>the</strong>r <strong>the</strong> correct image is displayed. If it is, she<br />

enters her password.<br />

The idea behind this antiphishing mechanism is that it enables <strong>the</strong> user<br />

to confirm that she is dealing with <strong>the</strong> au<strong>the</strong>ntic <strong>application</strong>, not a clone,<br />

because only <strong>the</strong> real <strong>application</strong> knows <strong>the</strong> correct image to display to<br />

<strong>the</strong> user.<br />

What vulnerability does this antiphishing mechanism introduce into <strong>the</strong><br />

login function? Is <strong>the</strong> mechanism effective at preventing phishing?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!