Web application security - the fast guide 1.1 | Page 8

6.5
Impersonation Functionality ........................................................................................ 118
6.6
Other issues ......................................................................................................................... 119
6.7
Authorization ...................................................................................................................... 119
6.8
Attack Execution-data stores ....................................................................................... 121
6.9
SQL injection ....................................................................................................................... 122
6.9.1
Attack Select statement ...................................................................................... 123
6.9.2
Attack insert ............................................................................................................. 123
6.9.3
Attack update statement .................................................................................... 123
6.9.4
Attacking Delete statement ............................................................................... 124
6.9.5
Attacking Using UNION ....................................................................................... 124
6.10
NO SQL injection ............................................................................................................... 125
6.11
XPath injection ................................................................................................................... 126
6.12
LDAP injection .................................................................................................................... 127
6.13
Attack Execution-Business Logic ................................................................................ 128
6.14
Web application Cross Site Scripting ( XSS ) ............................................................. 130
6.15
Echo or reflection based XSS ........................................................................................ 131
6.16
Stored script attack .......................................................................................................... 132
6.17
Data Object Model Based XSS ...................................................................................... 134
6.18
QUIZ : ...................................................................................................................................... 136
Chapter 7
Attack execution ( 3 ) ............................................................................................. 138
7.1
Attack webserver operating system .......................................................................... 139
7.2
Attack File system ............................................................................................................. 141
7.3
Inclusion method .............................................................................................................. 141
7.4
Path traversal method .................................................................................................... 143
7.5
Attack Mail service ........................................................................................................... 144
7.6
Header Juggling ................................................................................................................. 144
7.7
SMTP command injection .............................................................................................. 146
7.8
Attack XML ........................................................................................................................... 148
7.9
Attack SOAP Services ....................................................................................................... 149
7.10
Attack Checklist ................................................................................................................. 150
7.11
Evade Logging ..................................................................................................................... 152
7.11.1
Web Server Logs ..................................................................................................... 153
7.11.2
Escape logging :........................................................................................................ 153
7.11.3
Clearing logs :............................................................................................................ 154