当前位置:网站首页>Logical loopholes in security testing
Logical loopholes in security testing
2022-07-18 22:52:00 【NeilNiu】
For security testing , Our first reaction was to have a professional security team , Will use some existing open source or self-developed security vulnerability scanning tools . Some vulnerabilities were found after scanning , And then to verify . But this method also has some disadvantages , There are some false positives in the scanning results , Cause developers to repair , Discovery initiation is not a security vulnerability . At the same time, for a security team , Their workload is also huge . At this time, it is necessary for every tester to master the necessary security tests .
For security testing , Common types of vulnerabilities include XSS,SQL Inject ,CSRF、 File upload vulnerability 、 Logic loopholes, etc
This paper mainly analyzes the logical loopholes , For logical loopholes, it depends on WAF、RASP It is difficult to find vulnerabilities when the security system is scanned , It mainly considers the problem of permission control and verification in advance when developing and designing . The discovery of such vulnerabilities , Usually by hand , Or mining in a semi-automatic way , At this time, for testers , They know the business best , Therefore, it is more suitable for testers to explore such vulnerabilities . Logical vulnerabilities mainly include the following aspects :
One 、 Ultra vires loophole , Including the level of ultra vires 、 Vertical ultra vires
The level is beyond authority , Suppose the user A And users B Users with the same permission level , When the user A Access to users B Private data , It is called horizontal ultra vires . When we were testing , have access to BurpSuite Grab A User packets , Then the requested resources ID Replace with B User , Re contracting , If the result is B The data of , Then there is horizontal ultra vires .
Vertical ultra vires , Suppose the user A It's the average user , user B It's the administrator , When the user A Access to users B Private data , It is called vertical ultra vires , Also known as permission promotion . The test method is the same as level ultra vires , take A User's data , It is amended as follows B Administrator's data , If you return B User information for , Then there is vertical ultra vires .
unauthorized , It is to access a page or interface that requires login , Delete the login credentials and access again .
Two 、 Captcha vulnerability , Including whether the verification code can be exploded , By using BurpSuite adopt Intruder, Set up payload, Blast the validation field , Look at the length of the return , You can know which value is successful .
3、 ... and 、 Business logic loopholes , In the transaction process , Because the back-end does not perform mandatory verification on the bill of lading data , This leads users to buy goods at a lower price than normal . For example, when the order is paid , If you can BurpSuite Carry out the bag , Modify the payment amount , Or the quantity of goods , Still pay successfully , Then there is a logical flaw in this payment interface .
summary , These are three simple logical security vulnerabilities , It requires testers to excavate manually .
边栏推荐
- sklearn线性回归完成多次项函数和正弦函数拟合
- sklearn线性回归拟合一次项函数
- What if the work of product evaluators is repetitive and cumbersome? Can it be automated?
- Leetcode46. Full arrangement
- Byte 3 finally landed. Please keep this hot noodle Sutra "including free information"
- Cmu15445 (fall 2019) project 4 - logging & Recovery details
- Nature Aging | 激活FOXM1基因人类寿命或翻倍
- Marvell88q5192 switch debugging record (bsta1000b platform)
- Gym报错 The observation returned by the `reset()` method is not contained with the .......
- Honghu Wanlian Zhiyuan development board is officially integrated into the openharmony backbone
猜你喜欢

Overview of multimodal processing technology under data constraints

About products | how to plan products?

NPM installation tutorial

Problem solving -- > online OJ (16)

【小程序项目开发-- 京东商城】uni-app之商品列表页面 (上)

Leetcode 49. Alphabetic heterotopic word grouping

PHP memory overflow? How to solve it?

sklearn线性回归完成多次项函数和正弦函数拟合

npm安装教程

Sklearn linear regression fitting first-order term function
随机推荐
2022.7.15-----leetcode. five hundred and fifty-eight
远程购买商品Solidity合约
npm安装教程
Leetcode 47. Full arrangement II
2-conan binary package dependency management scheme
[deployment] redis
Visual studio production environment configuration scheme: slowcheetah
parker派克柱塞泵PV140R1K1T1NMMC
Web crawler technology creates its own Youdao dictionary
C # - adding thread, loading case of progress bar, adding video effect for the first time
三维点云课程(四)——聚类与模型拟合
Bigdata 作业 第14&15周
Leetcode46. Full arrangement
Quickly and completely delete node_ modules
Contrat de solidity pour l'achat à distance de marchandises
Arduino window garbled
封装、获取系统用户信息、角色及权限控制
Three sides of headlines + four sides of Alibaba + five sides of Tencent took the offer to share the summary, and finally joined Alibaba
The distant savior obeys the objective law (VII) -- cultural attribute
Z-Wave CTT usage and test demonstration