Hacking the Code ASP.NET Web Application Security [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Hacking the Code ASP.NET Web Application Security [Electronic resources] - نسخه متنی

James C. Foster, Mark M. Burnett

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید








Appendix B: Glossary of Web Application Security Threats



Account Hijacking


Taking over the account of a legitimate user, sometimes denying the rightful user access to his or her account.





Account Hopping


Manipulating an existing authentication token to gain access to another user’s account.





Brute Force Attack


The process of discovering user credentials by trying every possible character combination. Brute force attacks can be optimized by first trying dictionary words, common passwords, or predictable character combinations.





Backdoor Attack


Exploiting poorly implemented protection mechanisms by circumventing authentication or accessing content directly.





Banner Grabbing


The process of connecting to TCP ports and reading return banners to determine the type of service and software platform.





Buffer Overflow


Overwriting a buffer by sending more data than a buffer can handle, resulting in the application crashing or executing code of the attacker’s choice.





Buffer Overrun


See Buffer Overflow.





Command Injection


Injecting special shell metacharacters or otherwise manipulating input to cause the server to run shell commands or other code of the attacker’s choice.





Console Attack


An attack launched physically from the system’s local console.





Content Spoofing


Creating fake web content that mimics a web site to deceive a user into revealing login credentials or other sensitive information.





Cookie Manipulation


Modifying a browser cookie to exploit a security flaws in a web application.





Cookie Hijacking


Stealing the authentication cookie of a legitimate user to authenticate as and impersonate that user.





Cross-Site Request Forgery (CSRF)


Exploiting a site’s trust of a user to perform a transaction in behalf of the user. Usually involves tricking a user to click on a link or embedding a link in an HTML IMG tag.





Cross-Site Scripting (XSS)


An attack that involves injecting HTML or script commands into a trusted application with the purpose of hijacking a user’s cookie, session token, or account credentials.





Denial of Service (DoS)


Causing an application to excessively consume system resources or to stop functioning altogether.





Directory Traversal


Accessing files outside the bounds of the web application by manipulating input with directory traversal characters also known as the double dot attack





File system access


Manipulating input to read, write, or delete protected files on disk.





Information leakage


Revealing or failing to protect information that an attacker can use to compromise a system.





Luring Attack


Tricking a victim to run code or take actions in behalf of the attacker.





Man-in-the-middle (MITM)


Intercepting web traffic in such a way that the attacker is able to read and modify data in transit between two systems.





Phishing


A form of man-in-the-middle attack where the attacker lures a legitimate user to enter a password through a fake e-mail or web form designed to look like that of a legitimate web site.





Privilege escalation


Allowing an attacker to gain the access privileges of a higher level account.





Repudiation


The ability for a user to deny having taken an action or performed a transaction.


Resource exhaustion





Server-side code access


Revealing the content of server-side code or configuration files by manipulating input to disguise the true file extension.





Session fixation


Providing another user with a known fixed token to authenticate and then gaining access to that user’s session.





Sniffing


Using a network monitoring utility to intercept passwords or other sensitive information that traverses a network.





Social engineering


Using a hacker’s social skills to extract information from or otherwise manipulate employees or other trusted individuals at a target organization.





SQL injection


Manipulating user input to construct SQL statements that execute on the database server.





Token brute force attacks


Discovering a valid session token by submitting all possible combinations within the token’s key space.





Token hijacking


Being able to access another user’s token and potentially gain access to their account.





Token keep-alive


The process of periodically sending web requests to keep a session token from expiring, often used with session fixation attacks.





Token manipulation


Modifying a token on the URL or in a cookie to gain unauthorized access to an application.





Token prediction


Guessing or predicting a valid session token because the token scheme uses a sequential or predictable pattern.





Unauthorized access


Gaining access to restricted content or data without the consent of the content owner.






/ 96