Hacking the Code ASP.NET Web Application Security [Electronic resources]

James C. Foster, Mark M. Burnett

نسخه متنی -صفحه : 96/ 67
نمايش فراداده

Appendix B: Glossary of Web Application Security Threats

Account Hijacking

Taking over the account of a legitimate user, sometimes denying the rightful user access to his or her account.

Account Hopping

Manipulating an existing authentication token to gain access to another user’s account.

Brute Force Attack

The process of discovering user credentials by trying every possible character combination. Brute force attacks can be optimized by first trying dictionary words, common passwords, or predictable character combinations.

Backdoor Attack

Exploiting poorly implemented protection mechanisms by circumventing authentication or accessing content directly.

Banner Grabbing

The process of connecting to TCP ports and reading return banners to determine the type of service and software platform.

Buffer Overflow

Overwriting a buffer by sending more data than a buffer can handle, resulting in the application crashing or executing code of the attacker’s choice.

Buffer Overrun

See Buffer Overflow.

Command Injection

Injecting special shell metacharacters or otherwise manipulating input to cause the server to run shell commands or other code of the attacker’s choice.

Console Attack

An attack launched physically from the system’s local console.

Content Spoofing

Creating fake web content that mimics a web site to deceive a user into revealing login credentials or other sensitive information.

Cookie Manipulation

Modifying a browser cookie to exploit a security flaws in a web application.

Cookie Hijacking

Stealing the authentication cookie of a legitimate user to authenticate as and impersonate that user.

Cross-Site Request Forgery (CSRF)

Exploiting a site’s trust of a user to perform a transaction in behalf of the user. Usually involves tricking a user to click on a link or embedding a link in an HTML IMG tag.

Cross-Site Scripting (XSS)

An attack that involves injecting HTML or script commands into a trusted application with the purpose of hijacking a user’s cookie, session token, or account credentials.

Denial of Service (DoS)

Causing an application to excessively consume system resources or to stop functioning altogether.

Directory Traversal

Accessing files outside the bounds of the web application by manipulating input with directory traversal characters also known as the double dot attack

File system access

Manipulating input to read, write, or delete protected files on disk.

Information leakage

Revealing or failing to protect information that an attacker can use to compromise a system.

Luring Attack

Tricking a victim to run code or take actions in behalf of the attacker.

Man-in-the-middle (MITM)

Intercepting web traffic in such a way that the attacker is able to read and modify data in transit between two systems.

Phishing

A form of man-in-the-middle attack where the attacker lures a legitimate user to enter a password through a fake e-mail or web form designed to look like that of a legitimate web site.

Privilege escalation

Allowing an attacker to gain the access privileges of a higher level account.

Repudiation

The ability for a user to deny having taken an action or performed a transaction.

Resource exhaustion

Server-side code access

Revealing the content of server-side code or configuration files by manipulating input to disguise the true file extension.

Session fixation

Providing another user with a known fixed token to authenticate and then gaining access to that user’s session.

Sniffing

Using a network monitoring utility to intercept passwords or other sensitive information that traverses a network.

Social engineering

Using a hacker’s social skills to extract information from or otherwise manipulate employees or other trusted individuals at a target organization.

SQL injection

Manipulating user input to construct SQL statements that execute on the database server.

Token brute force attacks

Discovering a valid session token by submitting all possible combinations within the token’s key space.

Token hijacking

Being able to access another user’s token and potentially gain access to their account.

Token keep-alive

The process of periodically sending web requests to keep a session token from expiring, often used with session fixation attacks.

Token manipulation

Modifying a token on the URL or in a cookie to gain unauthorized access to an application.

Token prediction

Guessing or predicting a valid session token because the token scheme uses a sequential or predictable pattern.

Unauthorized access

Gaining access to restricted content or data without the consent of the content owner.