Web application security - the fast guide 1.1 | Page 7
4.15 More mapping tools ......................................................................................................... 81
4.15.1 OWASP Zed Attack Proxy Project: ................................................................... 81
4.15.2 Arachni: ........................................................................................................................ 82
4.15.3 Skipfish: ........................................................................................................................ 83
4.15.4 w3af ................................................................................................................................ 83
4.16 Attack analyzing – feasibility & priority ...................................................................... 84
4.17 QUIZ: ........................................................................................................................................ 85
Chapter 5
Attack Execution the client ............................................................................... 87
5.1 Attack the client .................................................................................................................. 88
5.2 Two types of attacks .......................................................................................................... 88
5.3 Altering cookies ................................................................................................................... 89
5.4 Flash Cookies (LSO) ............................................................................................................ 90
5.5 intercepting messages from Flash, Java applet and Silverlight ......................... 91
5.6 Decompile Flash, Java applet and Silverlight ........................................................... 92
5.7 Clickjacking ............................................................................................................................ 93
5.8 client SQLlight ....................................................................................................................... 94
5.9 ActiveX attack ....................................................................................................................... 95
5.10 Attack Execute- Pass JavaScript through Flash ........................................................ 97
5.11 Max Length ............................................................................................................................ 97
5.12 Attack ViewState ................................................................................................................. 99
5.13 Time of Creation to Time of Use ................................................................................. 100
5.14 JSON Hijacking .................................................................................................................... 101
5.15 Attack Execute- Phishing ................................................................................................ 103
5.16 Altering hidden fields ...................................................................................................... 105
5.17 Hashed hidden fields ....................................................................................................... 106
5.18 forge Referer Header ....................................................................................................... 107
5.19 Attack Execute- Direct Change to URL parameters ............................................. 108
5.20 Only Client side validation ............................................................................................. 109
5.21 QUIZ: ...................................................................................................................................... 111
Chapter 6
Attack execution (2) ............................................................................................. 113
6.1 Web application Authentication methods .............................................................. 114
6.2 Attack bad passwords ..................................................................................................... 115
6.3 Brute force attack ............................................................................................................. 116
6.4 Password management exploit ................................................................................... 117