Targets authentication process (when web app requests usernames and passwords).
Works against applications that behave differently under the following circumstances:
An attacker spams email logins, and observes the error message (e.g., “that email does not exist” v.s. “wrong credentials”)
If our app instead was always vague, it’d prevent harvesting data.
There was a good example with harvesting info based on platforms providing different email obfuscation patterns
a passcode was sent to l**[email protected]
” and “2fa sent to lill**@gmail.com
” from separate services reveals the email; poor SSN hiding, et cetera.Session IDs tie a browser session to a logged-in user.
A malicious intruder, if they get your session ID, may be able to spoof that user and steal their session.
Tools:
- Paros Proxy
- OWASP ZAP Proxy
- WebScarab
Defenses:
Use web app to send malicious code to clients.
Two Types:
Defenses:
TODO I vaguely remember built-in methods being discouraged(?)
Attacks agaisnt web apps with backend databases.
Effective against interpretted languages (e.g., SQL, LDAP, Perl, PDP)
When securing, look for pages that let the user submit data.
Take advantage of poorly sanitized input.
exec()