Attacking Access Control.ppt
《Attacking Access Control.ppt》由会员分享,可在线阅读,更多相关《Attacking Access Control.ppt(28页珍藏版)》请在麦多课文档分享上搜索。
1、Software Security Jorina van Malsen,Attacking Access Control,1,Outline,Access Controls Access Control Vulnerabilities Securing Access Controls Attacking Access Controls,2,Access Controls,A system which enables an authority to control access to areas and resources in a given physical facility or comp
2、uter-based information system. Access controls are a critical defense mechanism within the application because they are responsible for making the decision of whether it should permit a given request to perform its attempted action of access the resources that it is requesting.When they are defectiv
3、e, an attacker can often compromise the entire application, taking control of administrative functionality and accessing sensitive data belonging to every other user. Are among the most commonly encountered categories of web application vulnerability (ch. 1),3,Common Categories of Vulnerabilities,1.
4、 Broken Authentication Encompasses various defects within the applications login mechanism 2. Broken Access ControlsApplication fails to properly protect access to data and its functionality 3. SQL InjectionEnables an attacker to submit crafted input to interfere with the applications interaction wi
5、th back-end databases. 4. Cross-Site ScriptingEnables an attacker to target other users of the application 5. Information LeakageAn application divulges sensitive information that is of use to an attacker in developing an assault against the application, through defective error handling or other beh
6、avior,4,Vertical vs Horizontal Access Controls,Vertical Access Controls: Allow different types of users to access different parts of the applications functionality Division between ordinary users and administratorsHorizontal Access Controls: Allow users to access a certain subset of a wider range of
7、 resources of the same type Web mail application may allow you to read your email but no one elses; you can only see your own details,5,Access Control Vulnerabilities,Access controls are broken if any user is able to access functionality or resources for which he is not authorizedAmong the mot commo
8、nly encountered categories of web application vulnerabilities Two main types of attack against access controls1. Vertical privilege escalationWhen a user can perform functions that their assigned role does not permit them to do2. Horizontal privilege escalation When a user can view or modify resourc
9、es to which he is not entitled,6,Access Control Security and its Weaknesses,1. Completely Unprotected Functionality 2. Identifier-Based Functions 3. Multistage Functions 4. Static Files,7,Completely Unprotected Functionality,In many cases of broken access controls, sensitive functionality and resour
10、ces can be accessed by anyone who knows the relevant URLE.g. when https:/wahh- allows user to enter certain user interface. Weaknesses: URL can be guessed (especially by insider) Link appears in browser histories and the logs of web servers and proxy servers Users may write them down, bookmark them
11、or email them around They are not normally changed periodically, as passwords should be When users change job roles, and their access to administrative functionality needs to be withdrawn, there is no way to delete their knowledge of a particular URL.,8,Identifier-Based Functions,When a function of
12、an application is used to gain access to a specific resource, it is very common to see an identifier for the requested resource being passed to the server in a request parameter, either within the URL query string or the body of a post requestWhen the user who owns the document is logged in, a link
13、to this URL is displayed on the users My Documents page. Other users do not see this link. In order to be able to open the link/application an attacker needs to know the name of the application page and the identifier of the document he wishes to view. Weaknesses: Passwords often easy to guess Lots
14、of people write down resources identifiers or save them on their computer, so easy to find,9,Multistage Functions,Involves capturing different items of data from the user at each stage. This data is strictly checked when first submitted and then is usally passed to each subsequent stage, using hidde
15、n fields in an HTML form. Main Weaknesses: Often assumed by the developers is that any user who reaches the later stages of the process must have the relevant privileges because this was verified at the earlier stages Also often assumed is that people will access application pages in the intended se
16、quence; by taking “other path” people could avoid user identification,10,Static Files,In some cases, requests for protected resources are made directly to the static resources themselves, which are located within the web root of the server. e.g. an online publisher may allow users to browse its book
17、 catalog and purchase ebooks for download. Once the payment has been made, the user is directed to a download URL. As this is a completely static resource, it does not execute on the server, and its contents are simply returned directly by the web server. Hence, the resource itself cannot implement
18、any logic to verify that the requisting user has the privileges. When static resources are accessed in this way, it is highly likely that there are no effective access controls protecting them and that anyone who knows the URL naming scheme can exploit this to access ay resources they desire.,11,Sec
19、uring Access Controls: Pitfalls,Access controls are one of the easiest areas of web application security, though, there are several obvious pitfalls to avoid:Usually arise from ignorance about the essential requirements of effective access control or flawed assumptions about the kinds of requests th
20、at users will make and against which the application needs to defent itself Web application developers often implement access control functions on a piecemeal basis, adding code to individual pages in cases where they register that some access control is required, and often cutting and pasting the s
21、ame code between pages to implement similar requirements. Do not trust any user-submitted parameters to signify access rights (such as admin = true) Do not assume that users will access application pages in the intended sequence (make sure people will also not be able to avoid access controls by tak
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATTACKINGACCESSCONTROLPPT
