19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 13 n Attacking Users: O<strong>the</strong>r Techniques 569<br />

4. For each of <strong>the</strong> following technologies, identify <strong>the</strong> circumstances, if any,<br />

in which <strong>the</strong> technology would request /crossdomain.xml to properly<br />

enforce domain segregation:<br />

(a) Flash<br />

(b) Java<br />

(c) HTML5<br />

(d) Silverlight<br />

5. “We’re safe from clickjacking attacks because we don’t use frames.” What,<br />

if anything, is wrong with this statement?<br />

6. You identify a persistent XSS vulnerability within <strong>the</strong> display name caption<br />

used by an <strong>application</strong>. This string is only ever displayed to <strong>the</strong> user<br />

who configured it, when <strong>the</strong>y are logged in to <strong>the</strong> <strong>application</strong>. Describe<br />

<strong>the</strong> steps that an attack would need to perform to compromise ano<strong>the</strong>r<br />

user of <strong>the</strong> <strong>application</strong>.<br />

7. How would you test whe<strong>the</strong>r an <strong>application</strong> allows cross-domain requests<br />

using XMLHttpRequest?<br />

8. Describe three ways in which an attacker might induce a victim to use an<br />

arbitrary cookie.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!