Web App Vulnerabilities

Account Harvesting

Targets authentication process (when web app requests usernames and passwords).

Works against applications that behave differently under the following circumstances:

  1. User types in an incorrect user ID
  2. User types in a correct user ID with an incorrect password.
Example: Account Harvesting

An attacker spams email logins, and observes the error message (e.g., “that email does not exist” v.s. “wrong credentials”)

If our app instead was always vague, it’d prevent harvesting data.

There was a good example with harvesting info based on platforms providing different email obfuscation patterns

Brute Force Password Guessing

Session Stealing

Session IDs tie a browser session to a logged-in user.

A malicious intruder, if they get your session ID, may be able to spoof that user and steal their session.

Tools:

Defenses:

Cross Site Scripting XSS

Use web app to send malicious code to clients.

Two Types:

Defenses:

TODO I vaguely remember built-in methods being discouraged(?)

SQL Injection

Attacks agaisnt web apps with backend databases.

Effective against interpretted languages (e.g., SQL, LDAP, Perl, PDP)

When securing, look for pages that let the user submit data.

Command Injection

Take advantage of poorly sanitized input.

Evading Detection

Encoding

Although some sites strip