Web application security - the fast guide 1.1 | Page 6
3.5.6
Elevation of privileges: .......................................................................................... 53
3.6 Threats and vulnerabilities models - DREAD ............................................................ 53
3.7 Threats and vulnerabilities models - CVSS ................................................................ 54
3.8 OWASP Top 10: .................................................................................................................... 57
3.8.1 Injection: ...................................................................................................................... 57
3.8.2 Broken Authentication and Session Management ................................... 57
3.8.3 Insecure Direct Object References: ................................................................. 58
3.8.4 Cross-Site Scripting (XSS): ................................................................................... 58
3.8.5 Security Misconfiguration: .................................................................................. 58
3.8.6 Sensitive Data Exposure: ...................................................................................... 58
3.8.7 Missing Function Level Access Control: ........................................................ 58
3.8.8 Cross-Site Request Forgery (CSRF): ............................................................... 58
3.8.9 Using Components with Known Vulnerabilities: ..................................... 58
3.8.10 Invalidated Redirects and Forwards: ............................................................. 59
3.9
QUIZ.......................................................................................................................................... 60
Chapter 4
Be the attacker .......................................................................................................... 65
4.1 Be the Attacker .................................................................................................................... 66
4.2 Attackers categories .......................................................................................................... 66
4.3 Attacking process ................................................................................................................ 67
4.4 Mapping .................................................................................................................................. 68
4.5 Mapping infrastructure .................................................................................................... 68
4.6 Information about servers ............................................................................................... 69
4.7 Attack Mapping-Information about Intermediaries .............................................. 70
4.8 Mapping Application ......................................................................................................... 71
4.8.1 Mapping functionalities and contents: .......................................................... 71
4.8.2 Hidden content spidering: ................................................................................... 72
4.9
Other source of public information: ....................................................