19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 21 n A Web Application Hacker’s Methodology 845<br />

10 Test for Shared Hosting Vulnerabilities<br />

10.1. Test segregation in shared infrastructures<br />

10.2. Test segregation between ASP-hosted <strong>application</strong>s<br />

Figure 21-11: Testing for shared hosting vulnerabilities<br />

10.1 Test Segregation in Shared Infrastructures<br />

10.1.1 If <strong>the</strong> <strong>application</strong> is hosted in a shared infrastructure, examine <strong>the</strong> access<br />

mechanisms provided for customers of <strong>the</strong> shared environment to update<br />

and manage <strong>the</strong>ir content and functionality. Consider <strong>the</strong> following<br />

questions:<br />

n Does <strong>the</strong> remote access facility use a secure protocol and suitably<br />

hardened infrastructure?<br />

n Can customers access files, data, and o<strong>the</strong>r resources that <strong>the</strong>y do not<br />

legitimately need to access?<br />

n Can customers gain an interactive shell within <strong>the</strong> hosting environment<br />

and execute arbitrary commands?<br />

10.1.2 If a proprietary <strong>application</strong> is used to allow customers to configure and<br />

customize a shared environment, consider targeting this <strong>application</strong> as<br />

a way to compromise <strong>the</strong> environment itself and individual <strong>application</strong>s<br />

running within it.<br />

10.1.3 If you can achieve command execution, SQL injection, or arbitrary file<br />

access within one <strong>application</strong>, investigate carefully whe<strong>the</strong>r this provides<br />

any way to escalate your attack to target o<strong>the</strong>r <strong>application</strong>s.<br />

10.2 Test Segregation Between ASP-Hosted Applications<br />

10.2.1 If <strong>the</strong> <strong>application</strong> belongs to an ASP-hosted service composed of a<br />

mix of shared and customized components, identify any shared components<br />

such as logging mechanisms, administrative functions, and<br />

database code components. Attempt to leverage <strong>the</strong>se to compromise<br />

<strong>the</strong> shared portion of <strong>the</strong> <strong>application</strong> and <strong>the</strong>reby attack o<strong>the</strong>r individual<br />

<strong>application</strong>s.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!