6.5 |
Impersonation Functionality ........................................................................................ 118 |
|
6.6 |
Other issues ......................................................................................................................... 119 |
|
6.7 |
Authorization ...................................................................................................................... 119 |
|
6.8 |
Attack Execution-data stores ....................................................................................... 121 |
|
6.9 |
SQL injection ....................................................................................................................... 122 |
|
6.9.1 |
Attack Select statement ...................................................................................... 123 |
|
6.9.2 |
Attack insert ............................................................................................................. 123 |
|
6.9.3 |
Attack update statement .................................................................................... 123 |
|
6.9.4 |
Attacking Delete statement ............................................................................... 124 |
|
6.9.5 |
Attacking Using UNION ....................................................................................... 124 |
|
6.10 |
NO SQL injection ............................................................................................................... 125 |
|
6.11 |
XPath injection ................................................................................................................... 126 |
|
6.12 |
LDAP injection .................................................................................................................... 127 |
|
6.13 |
Attack Execution-Business Logic ................................................................................ 128 |
|
6.14 |
Web application Cross Site Scripting ( XSS ) ............................................................. 130 |
|
6.15 |
Echo or reflection based XSS ........................................................................................ 131 |
|
6.16 |
Stored script attack .......................................................................................................... 132 |
|
6.17 |
Data Object Model Based XSS ...................................................................................... 134 |
|
6.18 |
QUIZ : ...................................................................................................................................... 136 |
|
Chapter 7 |
Attack execution ( 3 ) ............................................................................................. 138 |
|
7.1 |
Attack webserver operating system .......................................................................... 139 |
|
7.2 |
Attack File system ............................................................................................................. 141 |
|
7.3 |
Inclusion method .............................................................................................................. 141 |
|
7.4 |
Path traversal method .................................................................................................... 143 |
|
7.5 |
Attack Mail service ........................................................................................................... 144 |
|
7.6 |
Header Juggling ................................................................................................................. 144 |
|
7.7 |
SMTP command injection .............................................................................................. 146 |
|
7.8 |
Attack XML ........................................................................................................................... 148 |
|
7.9 |
Attack SOAP Services ....................................................................................................... 149 |
|
7.10 |
Attack Checklist ................................................................................................................. 150 |
|
7.11 |
Evade Logging ..................................................................................................................... 152 |
|
7.11.1 |
Web Server Logs ..................................................................................................... 153 |
|
7.11.2 |
Escape logging :........................................................................................................ 153 |
|
7.11.3 |
Clearing logs :............................................................................................................ 154 |