-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Software Test Design
By :
The security threats to your application fall into two classes – acquiring access to restricted information and gaining control of private systems. The first class is easier and more common. Data leaks involve anything from accidentally allowing public access to data stores to using outdated cryptographic hashes, giving sufficiently resourced attackers the chance to break their encoding. It’s harder to control remote systems, but anywhere there is an input there is a chance to enter invalid data that will trick your application into obeying an attacker.
As a simple example, a 404 content injection attack involves creating a link that makes a trusted third party display a message of your choice. For example, you can enter www.example.com/visit_my_company in your browser. If example.com is vulnerable to this attack (which it isn’t, in reality), it would display an error such as The URL /visit_my_company was not found on this server.
You have now...
Change the font size
Change margin width
Change background colour