Security Testing Tutorial
Security Testing Useful Resources
Selected Reading
- Security Testing - Automation Tools
- Testing Malicious File Execution
- Security Testing - Denial of Service
- Security Testing - Buffer Overflows
- Testing Security - Web Service
- Security Testing - Ajax Security
- Unvalidated Redirects and Forwards
- Components with Vulnerabilities
- Cross Site Request Forgery
- Missing Function Level Access Control
- Testing Sensitive Data Exposure
- Testing Security Misconfiguration
- Insecure Direct Object Reference
- Testing Cross Site Scripting
- Testing Broken Authentication
- Security Testing - Injection
- Hacking Web Applications
- Security Testing - Cookies
- Security Testing - Same Origin Policy
- Security Testing - Cryptography
- Encoding and Decoding
- HTTPS Protocol Basics
- HTTP Protocol Basics
- Security Testing - Malicious Software
- Security Testing - Process
- Security Testing - Overview
- Security Testing - Home
Security Testing Useful Resources
Selected Reading
- Who is Who
- Computer Glossary
- HR Interview Questions
- Effective Resume Writing
- Questions and Answers
- UPSC IAS Exams Notes
Insecure Direct Object Reference
Insecure Direct Object References
如果不建立任何验证机制,让攻击者操纵这些提及获取未经许可的数据时,开发商可能会直接提及内部执行物体,如档案、目录或数据库钥匙。
让我们在简单图表的帮助下理解这一缺陷的威胁代理人、攻击者、安全弱点、技术影响和商业影响。
Example
应用程序在正在获取账户信息的电传中使用未经核实的数据。
String sqlquery = "SELECT * FROM useraccounts WHERE account = ?"; PreparedStatement st = connection.prepareStatement(sqlquery, ??); st.setString( 1, request.getParameter("acct")); ResultSet results = st.executeQuery( );
袭击者将弹道参数 mo到Admin。
http://webapp.com/app/accountInfo?acct=admin
Hands ON
开发商可使用以下资源/点作为指南,防止在开发阶段本身出现不可靠的直接物体。 开发商只应使用一个用户或一个届会作为间接物体参考。Preventive Mechanisms
还建议在使用未经委托的源头直接标注之前检查出入情况。
Advertisements