2.2.2.2 A number of security measures to overcome
only use hidden form variable to display data on the browser, not the value of the variable used to manipulate the application processor.
For example, as when we up photos to a site and design when the user selects the picture thumbnail will be small even if the user chooses to, the picture size is magnified this purpose in the form of hidden variables.
Pairing names and values of hidden variables into a single string. Use MD5 encryption algorithm or a hash function to synthesize the string and save it to a hidden field called "chain model". When the value of the form is sent, the above operation is performed again with the same course we set before. Then compared with "String template", if they do not match, it proves the value of the form was changed.
Using a Session ID to refer to information stored on the database.
2.2. 3 Manipulating Cookies
2.2.3.1 Technical attacks
storage components Cookie is the most secure information should Cookies are generally used to store state for the HTTP protocol. It is also used for storing user information when using the application and other data of the Session. All types of cookies can be altered during transmission from the user to the web server. Therefore Hacker can change content to sabotage Cookie Web application or to a certain goal. The following example shows how to change a Cookie.
Example: Cookies store information on bank deposit accounts.
Cookie: lang = en-us; ADMIN = no; y = 1; time = 8: 30GMT,
Cookie identifies the user is not the administrator, but if Hacker changes ADMIN school about this?. Thus, the hacker will have administrative rights on the site or web application with the following changes:
Cookie: lang = en-us; ADMIN = yes; y = 1; time = 15: 30GMT;
2.2.3.2 Some security measures to overcome
information Use the Session object store important information on your server. When the application needs to check the information a user, the application will use the Session ID of the user to refer to the user's information in the database.
Develop a mechanism to check the contents of the cookie to find the price Invalid value from it knowing it's fake cookie.
For example: If the variable flags "administrator" is set right in the cookie, but the value of the order is not the same user in the cookie with the serial number of "administrator" is stored on the server.
Encrypting cookie to the cookies have been falling into the hands of hackers, it also can not read the contents inside as they are encrypted if you want to read, then arrested Hacker forced to decipher, decode, it may be out but the problem here is in how long. In this way also makes it more difficult to steal the user's information.
2.3 WORKING SESSION POSSESSION
2.3.1 Assign session (Session Fixation)
2.3.1.1 Technical attacked
As attack techniques allow Hacker impersonate legitimate users by sending a valid Session ID to the user, after the user has logged into the system successfully, the Session ID Hacker will use this feature, the user automatically become a valid and exploitation information or for any purpose at the server.
For example: Attacker wants captured session certain users are using bank accounts.
(1) and (2) This step will establish a session Attacker Invalid work with servers by logging into your account. Thus there was a valid session from the bank server.
(3) After you have registered a valid session is complete, the new Attacker an email or send in any way to force users to click on the link with ID Attacker session, when clicking on the links that it will redirect to a server bank account and asked to enter a password to as step (4).
(5) Thus the user has logged on site's server bank with the session ID is fixed in advance by the attacker. Attacker session ID and session ID of the user actually is one.
(6) Attacker log on bank websites with user account and to fulfill the intentions as Attacker want.
With this technique, the attacker easily surpassed the server side checked whether the session ID.
đang được dịch, vui lòng đợi..
