Web application security - the fast guide 1.1 | Page 8

6.5
Impersonation Functionality........................................................................................ 118
6.6
Other issues......................................................................................................................... 119
6.7
Authorization...................................................................................................................... 119
6.8
Attack Execution-data stores....................................................................................... 121
6.9
SQL injection....................................................................................................................... 122
6.9.1
Attack Select statement...................................................................................... 123
6.9.2
Attack insert............................................................................................................. 123
6.9.3
Attack update statement.................................................................................... 123
6.9.4
Attacking Delete statement............................................................................... 124
6.9.5
Attacking Using UNION....................................................................................... 124
6.10
NO SQL injection............................................................................................................... 125
6.11
XPath injection................................................................................................................... 126
6.12
LDAP injection.................................................................................................................... 127
6.13
Attack Execution-Business Logic................................................................................ 128
6.14
Web application Cross Site Scripting( XSS)............................................................. 130
6.15
Echo or reflection based XSS........................................................................................ 131
6.16
Stored script attack.......................................................................................................... 132
6.17
Data Object Model Based XSS...................................................................................... 134
6.18
QUIZ:...................................................................................................................................... 136
Chapter 7
Attack execution( 3)............................................................................................. 138
7.1
Attack webserver operating system.......................................................................... 139
7.2
Attack File system............................................................................................................. 141
7.3
Inclusion method.............................................................................................................. 141
7.4
Path traversal method.................................................................................................... 143
7.5
Attack Mail service........................................................................................................... 144
7.6
Header Juggling................................................................................................................. 144
7.7
SMTP command injection.............................................................................................. 146
7.8
Attack XML........................................................................................................................... 148
7.9
Attack SOAP Services....................................................................................................... 149
7.10
Attack Checklist................................................................................................................. 150
7.11
Evade Logging..................................................................................................................... 152
7.11.1
Web Server Logs..................................................................................................... 153
7.11.2
Escape logging:........................................................................................................ 153
7.11.3
Clearing logs:............................................................................................................ 154