O'Reilly logo

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition by Marcus Pinto, Dafydd Stuttard

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Questions

Answers can be found at http://mdsec.net/wahh.

  1. You log in to an application, and the server sets the following cookie:
    Set-cookie: sessid=amltMjM6MTI0MToxMTk0ODcwODYz;

    An hour later, you log in again and receive the following:

    Set-cookie: sessid=amltMjM6MTI0MToxMTk0ODc1MTMy;

    What can you deduce about these cookies?

  2. An application employs six-character alphanumeric session tokens and five-character alphanumeric passwords. Both are randomly generated according to an unpredictable algorithm. Which of these is likely to be the more worthwhile target for a brute-force guessing attack? List all the different factors that may be relevant to your decision.
  3. You log in to an application at the following URL:
    https://foo.wahh-app.com/login/home.php

    and the server sets the following cookie:

    Set-cookie: sessionId=1498172056438227; domain=foo.wahh-
    app.com; path=/login; HttpOnly;

    You then visit a range of other URLs. To which of the following will your browser submit the sessionId cookie? (Select all that apply.)

  4. The application you are targeting uses per-page tokens in addition to the primary session token. If a per-page token ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required