140 likes | 262 Views
Explore the intricacies of web security through the lens of hacking techniques used for fun and profit. This guide covers critical concepts such as form parameter manipulation, cookie manipulation, SQL injection, and cross-site scripting (XSS). Learn how data can be exploited and the importance of validation to protect against vulnerabilities. Discover methods to secure your applications, including session management, encoding, and effective use of server-side hashes. Stay informed about security best practices to safeguard your web applications from malicious attacks.
E N D
Hacking websites for fun & profit Barry Dorrans Charteris plc http://idunno.org
Form Parameter Manipulation “Important” data is for server sideHash or ChecksumDuplicate validation
Cookie Manipulation Hash or ChecksumValidate
HTTP Headers Easily Faked Validate
Cross Site Scripting / XSS Beware < & >Never display raw inputDo not turn off validation site wide
Cross Site Scripting / XSS There’s more to script than <script>HTML tags have eventsSession hijacks, cookie stealing, browser hijinks
Character Encoding \ = %5C = %255C = %%35%63Server.*Encodehttp://ha.ckers.org/xss.html
SQL Injection Manipulation of “raw” SQLStored ProceduresNamed Parameters
SQL Injection SQL PermissionsCAS / Data Access AssembliesManaged Components
Storing Secrets Hashing is not encryptingDictionary attacksSalt your data
Leaking Information; Search Search Engines"# -FrontPage-" inurl:service.pwd http://johnny.ihackstuff.com/
Leaking Information; Errors Exceptions<compilation debug="true" />
Leaking Information; ViewState ViewState is not encrypted by defaultMAC lock • <system.web> <machineKeydecryptionKey="AutoGenerate,IsolateApps" decryption="3DES" ... /> <system.web/>