首页 > Web开发 > 详细

Penetration Test - Select Your Attacks(9)

时间:2020-10-02 13:31:01      阅读:24      评论:0      收藏:0      [点我收藏+]

Application Exploits, Part II

AUTHENTICATION EXPLOITS
  • Credential brute forcing
    • Offline cracking(Hydra)
  • Session hijacking
    • Intercepting and using a session token(generally) to take over a valid distributed (web) session
  • Redirect
    • Sending the user to a different site from what they expected (phishing)
  • Default credentials
    • Out of the box artifacts (you have to clean these up!)
  • Weak credentials
    • This is why password cracking works
  • Kerberos exploits
    • Forged tickets to allow unauthorized access to resources
AUTHORIZATION
  • Parameter pollution
    • Providing custom input parameters to alter service/API operation
  • Insecure direct object reference
    • Programming mistake that can allow an attacker to bypass access controls and access resources or data
QUICK REVIEW
  • Authentication attacks include credential brute forcing, session hijacking, redirecting, and forged Kerberos tickets
  • If you can acquire valid authentication credentials, you have access to lots of data
  • Authorization attacks include parameter pollution and insecure direct object reference

Penetration Test - Select Your Attacks(9)

原文:https://www.cnblogs.com/keepmoving1113/p/13760430.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!