applicationsecurityreviews内容摘要:

SQL Injection zip: 8020239。 UNION SELECT username, password, null, null, null FROM users SELECT name, address, city, state, zip FROM customers WHERE zip = 39。 8020239。 UNION SELECT username, password, null, null, null FROM users 39。 OWASP 20 SQL Injection Name Address City State Zip David Byrne 123 Main St Denver CO 80202 John Doe 345 17th St Denver CO 80202 Peter Smith 678 Main St Sometown CA 90332 Jane Peterson 445 6 Ave Lakeside ID 12345 Sue Brown 421 Evergreen St Springfield MD 13512 byrned very_secure jdoe asdf smithp mary jpeter jane123 browns =(Gd OWASP 21 SQL Injection  Resources:    /white_papers/   OWASP 22 Cross Site Scripting (XSS)  Allows an attacker to imbed arbitrary HTML inside a web page  Can be persistent (. a bulletin board) or dynamic (. a URL)  JavaScript can  Redirect the browser to an attack site  Monitor and report browsing activity using frames  Launch attacks against browser vulnerabilities  Steal cookies  Perform actions while impersonating user (MySpace worm) OWASP 23 Cross Site Scripting (XSS)  Look for any content in a web page that was based on userprovided input  Check the source: The content might be in the HTML, but not displayed  Input isn’t limited to visible form fields. Look at cookies, HTTP headers, URL query strings, hidden fields  Standard pages aren’t the only source of XSS。 error pages (even 404s) are frequently vulnerable OWASP 24 Cross Site Scripting (XSS) Customer Search Tool Zip Code: No results were found for zip code 39。 0000039。 提交OWASP 25 Cross Site Scripting OWASP 26 Cross Site Scripting (XSS)  Resources:    OWASP 27 Buffer Overflows  Not mon with modern web environments  With black box, send long strings for different parameters, 1024 bytes。 might have to switch to POST  White box techniques beyond presentation’s scope OWASP 28 Denial of Service (DoS)  Locking Customer Accounts  Buffer Overflows  User Specified Object Allocation  User Input as a Loop Counter  Writing User Provided Data to Disk  Failure to Release Resources  Storing too Much Data in Session  application_layer_Denial_of_Service_%28DoS%29_attacks OWASP 29 Authentication amp。 Authorization  Session IDs  Authentication  Authorization OWASP 30 Session IDs  Session IDs best stored in a。
阅读剩余 0%
本站所有文章资讯、展示的图片素材等内容均为注册用户上传(部分报媒/平媒内容转载自网络合作媒体),仅供学习参考。 用户通过本站上传、发布的任何内容的知识产权归属用户或原始著作权人所有。如有侵犯您的版权,请联系我们反馈本站将在三个工作日内改正。