Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
Code Auditing and Reverse Engineering • Chapter 6 235
Because the actual method of information disclosure can widely vary
within any language, there are no exact functions or code snippets to
look for.
Checking for File System Access/Interaction
The Web is basically a graphically based file sharing protocol; the
opening and reading of user-specified files is the core of what makes the
Web run.Therefore, it’s not far off base for Web applications to interact
with the file system as well. Essentially, you should definitively know
exactly where, when, and how a Web application accesses the local file
system on the server.The danger lies in using filenames that ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312