Key points of business security vulnerability mining

Source: Internet
Author: User
Tags log log

Business security vulnerability Mining Essentials 1 Authentication security   Brute Force    a large number of attempts to guess the password in a violent, exhaustive manner. Generally include dictionary attacks and violent poor lifting.    example    360 Cloud disk sharing code can be brute force http://www.wooyun.org/bugs/wooyun-2015-0121646     Rice Network login does not need verification code to lead to brute force http://www.wooyun.org/bugs/wooyun-2015-0145757   defense method:    Verification Code mechanism, One-time authentication code     login failure processing function, login limit, lock function     Two authentication mechanism    tool:    Burpsuite Tools   Collisions    examples     the lily net brute force hack user name password very high success rate http://www.wooyun.org/bugs/ wooyun-2010-091527    Huawei Cloud Services can be a brute force hack and Crash Library http://www.wooyun.org/bugs/wooyun-2014-078348   tool:    htpwdscan url:https://github.com/lijiejie/htpwdscan   Collision Prevention Method      Unify all login interfaces, discard each app's separate login entry     sub-theme   Weak encryption mechanism    example:    An online training system Base64 coded general SQL Blind Vulnerability http://www.wooyun.org/bugs/wooyun-2015-0120906   using MD5,BASE64 and other cryptographic encoding technology     Defense     No Hash+salt encryption 2 business consistency security   business consistency avoid vertical, parallel, and arbitrary information acquisition by the user.  Mobile phone number tampering    modifying the phone number parameters for other numbers by grabbing a packet to try to get information    for example, in the Check page, enter your own number and then grab the package, modify the phone number parameter for the other person's number, to see if you can query other people's business.    Example:    gome a sub-station binding mobile phone number any reset can modify the transaction password http://www.wooyun.org/bugs/wooyun-2010-0166377  Mailbox or user tamper    Grab package Modify user or mailbox parameter for other user or mailbox    sample     Green Union RSAS security System full version kill Rights Manager bypass vulnerability, including latest RSAS V5.0.13.2 http://www.wooyun.org/bugs/wooyun-2014-074441  Order ID Tamper    view own order ID, Then modify the ID (plus minus one) to see if other order information can be viewed.    Example     travel agent unlimited access to user orders http://www.wooyun.org/bugs/wooyun-2013-044137  product number tampering     For example, Points Redemption office, 100 points can only change the product number 001, 1000 points can only change the product number 005, in the 100 points for merchandise to grab the package to change the number of items changed to 005, with low points for the area of high-score products.    example     Lenovo Points Mall Payment vulnerability Bypass http://www.wooyun.org/bugs/wooyun-2013-041617    Lenovo Points Mall logic file leads to payment vulnerability http://www.wooyun.org/bugs/wooyun-2013-037058  User ID tamper    Grab package View your User ID, Then modify the ID (plus minus 1) to see if other user ID information can be viewed.    example:    NET million CV leakage risk http://www.wooyun.org/bugs/wooyun-2015-0111617 3 business Data tampering   amount data tampering  &nbSP; A field such as the amount of the item to be modified in the payment page, such as the Amount field of the goods in the request, modified to any amount and submitted to see if the business process can be completed with the revised amount data.    example    12308 Total price on order Payment No validation Vulnerability (Payment logic vulnerability) http://www.wooyun.org/bugs/wooyun-2015-0117083    destoon Unlimited increase in the number of account funds http://www.wooyun.org/bugs/wooyun-2014-050481  goods quantity Tamper    Grab package Modify the number of items and other fields, Modify the number of items in the request to any amount, such as negative and submit, to see if the business process can be completed with the modified quantity.    Example     Azure Group Payment Logic Vulnerability (can be paid in negative) http://www.wooyun.org/bugs/wooyun-2015-0109037  maximum limit breakout    Many products limit the number of users to purchase, the server only in the page through the JS script limit, not on the server side to verify the number of user submissions, through the capture package to modify the maximum number of items limit, the number of items in the request to be greater than the maximum limit value, to see whether the revised quantity of the business process.   Local JS parameter modification    Some applications use JavaScript to process user-submitted requests by modifying JavaScript scripts to test whether the modified data affects the user. 4 user input Compliance   injection testing  XSS cross-site Scripting  fuzz testing    Functional Testing with more, it is possible that a very long special string causes system denial of service or feature missing.    Possible tools--spike  other applications that interact with user Input vulnerability 5 password recovery   Password recovery The intention is to design to those who forgot the password, so that they can retrieve their password.   Example:   Lily net modify any sister account password Vulnerability http://www.wooyun.org/bugs/wooyun-2012-014594  password Recovery Vulnerability Summary    http://drops.wooyun.org/web/5048  process:   i. First try toPassword recovery process, choose different ways to retrieve, record all packet   ii. Analyze the packet to find the sensitive part of the   III. The verification means used to analyze the back-up mechanism   iv. Modify packet Validation inference 6 verification code breakout   Verification code not only in the login, find password application, submit sensitive data where there are similar applications   verification Code brute Force test    use burp to brute force specific verification code to crack    Ally 88 E-commerce platform any user registration and any user password Reset vulnerability package http://www.wooyun.org/bugs/wooyun-2015-093932  verification code time, frequency test    Fetch the packets carrying the verification code and repeat the submission repeatedly.    For example: In the complaint suggestion to enter the content information to be complained about, and verification code parameters, when the packet repeated submission packet, to see the history of complaints in the presence of duplicate submissions of parameter information.   Verification Code client echo test    when the client needs to interact with the server and send a verification code, you can use Firefox to press F12 to bring up firebug to see the details of the client interacting with the server   Verification code bypass test    when the first step jumps to the second step, grab the packet, tamper with the code to clear the test, verify that the step verification code can be bypassed.    example     Design defect of information security management system in an IDC computer room of China Telecom system http://www.wooyun.org/bugs/wooyun-2015-098765   Verification Code JS bypass    SMS Verification Code Verification Program Logic defects, the first step of the business process, the second, the third step is placed on the same page, verify that the first step verification code is by JS to judge, The verification code can be modified without obtaining a verification code can fill in the real name information, and submitted successfully. 7 Business Authorization security   unauthorized access    unauthorized access means that the user has direct access to the page or text information that needs to be authenticated for access without a certification authorization. You can try to log in to a website after the foreground or background, copy the relevant page links to other browsers or other computers to access to see if the access to success.   Unauthorized access    ultra vires vulnerability is mainly due to developers in the data to increase, delete, change, query the client requested data over-phaseThe letter and the omission of the authority of the decision    vertical ultra vires (vertical vires refers to the use of low-privileged users can access the higher rights of users)    level of ultra vires (the level of authority refers to the same permissions of different users can access each other)    the My way of overstepping the url:http://drops.wooyun.org/tips/727  example    Guangzhou Metro a system unauthorized access vulnerability can lead to internal personnel information leakage http://www.wooyun.org/ bugs/wooyun-2010-0157827   HONGTA Securities from the log log unauthorized access to the collapse of OA (a lot of information fell) http://www.wooyun.org/bugs/wooyun-2015-01613168 Business process chaos   sequential execution defects  1, partial site logic may be first a process after B procedure and then C process last D procedure 2, the user controls each request they send to the application, so it can be accessed in any order. The user then enters the D process directly from B, bypassing C. If C is the payment process, then the user bypasses the payment process and buys a product. If C is the verification process, it bypasses the validation and goes directly to the website program.   Example    Amoy network Logic Vulnerability beauty QQ, mobile phone number and other information free to see (1 cents not to give) http://wooyun.org/bugs/wooyun-2010-01081849 business interface calls   replay attacks    in the SMS, mail call business or generate Business Data link (class: Text message verification Code, email verification Code, order generation, comment submission, etc.), to its business links to call (replay) test. If the business is called (replayed) and is generated multiple times valid business or data results    an MU Tian Trading network logic loophole (cask principle) http://www.wooyun.org/bugs/wooyun-2015-094545  Content editing 10 timeliness bypass   time refresh Defect  12306 website ticket business is every 5s, the ticket will be refreshed once. But this time does set the interval locally. As a result, the associated variables of this time can be reset to 1s or smaller at the console so that the refresh time is significantly shortened (mainly changing the autosearchtime local parameters).   12306 Auto-brush ticket time can change vulnerability Http://www.wooyun.org/bugs/wooyun-2014-048391  time range test   for certain time-limited businesses, modify their time limits, 1, for example, a business that is queried within a time limit, modify a request with a time-limited text segment and submit, to see if the business process can be completed by bypassing the time limit. 2. For example, by changing the range of month in which the processing records of the mobile office are queried, you can break through the default record of only six months.


Mind Mapping:

Key points of business security vulnerability mining

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.