19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

668 Chapter 17 n Attacking Application Architecture<br />

server. Can you leverage this vulnerability to compromise <strong>the</strong> <strong>application</strong><br />

server? For example, could you modify <strong>the</strong> <strong>application</strong>’s scripts held on<br />

<strong>the</strong> <strong>application</strong> server, and <strong>the</strong> content returned to users?<br />

3. You are attacking a <strong>web</strong> <strong>application</strong> that is hosted in a shared environment.<br />

By taking out a contract with <strong>the</strong> ISP, you can acquire some <strong>web</strong> space on<br />

<strong>the</strong> same server as your target, where you are permitted to upload PHP<br />

scripts.<br />

Can you exploit this situation to compromise <strong>the</strong> <strong>application</strong> you are<br />

targeting?<br />

4. The architecture components Linux, Apache, MySQL, and PHP are often<br />

found installed on <strong>the</strong> same physical server. Why can this diminish <strong>the</strong><br />

security posture of <strong>the</strong> <strong>application</strong>’s architecture?<br />

5. How could you look for evidence that <strong>the</strong> <strong>application</strong> you are attacking is<br />

part of a wider <strong>application</strong> managed by an <strong>application</strong> service provider?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!