19.09.2017 Views

the-web-application-hackers-handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

558 Chapter 13 n Attacking Users: O<strong>the</strong>r Techniques<br />

Various tools exist for enumerating and testing <strong>the</strong> methods exposed by<br />

ActiveX controls. One useful tool is COMRaider by iDefense, which can display<br />

all of a control’s methods and perform basic fuzz testing of each, as shown in<br />

Figure 13-7.<br />

Figure 13-7: COMRaider showing <strong>the</strong> methods of an ActiveX control<br />

Preventing ActiveX Vulnerabilities<br />

Defending native compiled software components against attack is a large and<br />

complex topic that is outside <strong>the</strong> scope of this book. Basically, <strong>the</strong> designers and<br />

developers of an ActiveX control must ensure that <strong>the</strong> methods it implements<br />

cannot be invoked by a malicious <strong>web</strong>site to carry out undesirable actions against<br />

a user who has installed it. For example:<br />

n A security-focused source code review and penetration test should be carried<br />

out on <strong>the</strong> control to locate vulnerabilities such as buffer overflows.<br />

n The control should not expose any inherently dangerous methods that<br />

call out to <strong>the</strong> filesystem or operating system using user-controllable

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!