19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Index<br />

A<br />

Absin<strong>the</strong>, 322<br />

absolute URLs, open redirection<br />

vulnerabilities<br />

blocking, 544–545<br />

prefix, 545–546<br />

“accept known good” approach,<br />

input, 24<br />

access<br />

ASP attackers, 658–660<br />

ASP.NET API methods<br />

database, 721<br />

file, 720<br />

ASPs and customer, 665–666<br />

database<br />

ASP.NET API methods, 721<br />

Java API methods, 714–715<br />

Perl language API methods,<br />

737–738<br />

PHP API methods, 729–730<br />

defense mechanisms handling,<br />

18–21<br />

au<strong>the</strong>ntication, 18–19<br />

control, 20–21<br />

session management, 19–20<br />

Java API methods<br />

database, 714–715<br />

file, 713<br />

Perl language API methods<br />

database, 737–738<br />

file, 737<br />

PHP API methods<br />

database, 729–730<br />

file, 727–729<br />

shared hosting<br />

attackers, 658–660<br />

customer, 665–666<br />

trust relationships in tiered<br />

architecture, 649<br />

access controls<br />

account testing, 267–270<br />

API methods, 276–277<br />

HTTP methods, 278<br />

limited access, 273–276<br />

multistage function, 271–273<br />

static resources, 277<br />

<strong>application</strong> mapping, 268–269<br />

attackers, 266–278<br />

types, 258–260<br />

usernames and passwords,<br />

275–276<br />

back-end components, 357<br />

broken, 7, 274<br />

context-dependent, 258<br />

declarative, 282–283<br />

defective, 257<br />

discretionary, 282<br />

flaws, 284<br />

hacker’s methodology<br />

insecure access, 823<br />

limited access, 822–823<br />

multiple accounts, 822<br />

requirements, 821<br />

horizontal, 258<br />

identifier-based functions,<br />

261–262<br />

insecure methods, 265–266<br />

location-based, 266<br />

multistage functions, 262–263<br />

testing, 271–273<br />

parameter-based, 265–266<br />

per-user segregation, 274<br />

platforms, 264–265<br />

programmatic, 282<br />

referer-based, 266<br />

role-based, 282<br />

security, 278–283<br />

best practices, 279–280<br />

central component approach,<br />

280<br />

multilayered privilege<br />

model, 280–283<br />

pitfalls, 278–279<br />

static resources, 263–264<br />

account testing, 277<br />

unprotected functionality, API<br />

methods, 260–261<br />

vertical, 258<br />

vulnerabilities, 258–266, 276<br />

<strong>application</strong> logic flaws, 411<br />

Access-Control-Allow-<br />

Origin headers, 528–529<br />

account activation URLs, 184<br />

account suspension, 197–198<br />

account testing, access controls,<br />

267–270<br />

API methods, 276–277<br />

HTTP methods, 278<br />

limited access, 273–276<br />

multistage function, 271–273<br />

static resources, 277<br />

Achilles proxy, 751<br />

Action Message Format (AMF),<br />

135<br />

Burp Suite, 137<br />

active scanning, 764–765<br />

ActiveX controls, 447<br />

COMRaider, 558<br />

853

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!