Webã¢ããªã±ã¼ã·ã§ã³ã¸ã®æ»æãæèãã
ã¦ã§ãæ»æã®ãããã
- æ¦è¦
- 被害
- äºé²
XSS(Cross Site Scripting)
- åçãªWebãã¼ã¸ã«ã¹ã¯ãªãããæ··å ¥ãããã
- ä»ã®ãã¼ã¸ã¸èªå°ãCSRFã¸ã®è¸ã¿å°ãç§å¯æ å ±ã®çªåããã¼ã¸å½è£ ã
- å ¥åãããå¤ã«HTMLã¿ã°ã許å¯ããªããå ¥åãããå¤ãç´æ¥è¡¨ç¤ºããªããå¤ã®åºåã«ã¯ã¿ã°ãç¡å¹åããã
SQL Injection
- ä¸æ£ã«ãã¼ã¿ãã¼ã¹ãæä½ããã
- æ©å¯æ å ±ã®æ¼æ´©ãèªè¨¼ã®åé¿ã«ããä¸æ£ãã°ã¤ã³ãæ å ±ã®æ¹ããã
- ç¹æ®æåã許å¯ããªããparameterized query(ãã©ã¡ã¿ã©ã¤ãºãã¯ã¨ãª)ãç¨ãããã§ããã ãå ¥åãããå¤ãç´æ¥ä½¿ç¨ããªãã
second-order SQL injection
- ãã¹ã¯ã¼ãã®åè¨å®æãªã©ã®å¯¾çæ¼ããçã£ãæ»æãä¸æ£ã«ãã¼ã¿ãã¼ã¹ãæä½ããã
- æ©å¯æ å ±ã®æ¼æ´©ãèªè¨¼ã®åé¿ã«ããä¸æ£ãã°ã¤ã³ãæ å ±ã®æ¹ããã
- SQLã¤ã³ã¸ã§ã¯ã·ã§ã³å¯¾çæ¼ãã«ãããã®ãé©åã«SQLã¤ã³ã¸ã§ã¯ã·ã§ã³å¯¾çãè¡ãã
blind SQL injection
- SQLã¤ã³ã¸ã§ã¯ã·ã§ã³ãè¡ããæ¡ä»¶åå²ã®çµæããæ å ±ãçã¿ã ãã
- æ©å¯æ å ±ã®æ¼æ´©ã
- Yes(ç)ã¨No(å½)ã®çµæãããã¹ã¦ã®æ å ±ãåãããå¯è½æ§ããããé©åã«SQLã¤ã³ã¸ã§ã¯ã·ã§ã³å¯¾çãè¡ãã
CSRF(Cross Site Request Forgaries)
- ä¸æ£ãªã¹ã¯ãªããããªãã¤ã¬ã¯ããä»è¾¼ã¾ãããã¼ã¸ãããå¥ã®Webãµã¤ãä¸ã§ä½ããã®æä½(æ²ç¤ºæ¿ã¸ã®æ¸ãè¾¼ã¿ãªã©)ãè¡ãªãããæ»æææ³ã
- æå³ããªãå¥ãµã¤ãã¸ã®æ¸ãè¾¼ã¿ã
- ãµã¤ãå¤ããã®ãªã¯ã¨ã¹ãã®åä¿¡æå¦ããããã®åç §å 確èªããã§ãã¯ã³ã¼ãã«ããä¸è²«æ§ã®ç¢ºèªãè¡ãã
ãã£ããã¨ããéã
- XSSâä¸æ£ãªã¹ã¯ãªããåãè¾¼ã¿âä¸æ£ãªã¹ã¯ãªããã®è¡¨ç¤ºâã¯ã©ã¤ã¢ã³ãã§ã¹ã¯ãªããå®è¡ãï¼è¡¨ç¤ºãããã¨ãã«åé¡ã«ãªãï¼
- CRSFâæªæã®ãããªã³ã¯ã¾ãã¯ã¹ã¯ãªããâã¯ãªãã¯âãµã¼ãã§ã¹ã¯ãªããå®è¡âä»ã®æ²ç¤ºæ¿ã«æ¸ãè¾¼ã¿ãï¼è¡¨ç¤ºãããªãã¦ãåé¡ã«ãªãï¼
Null Byte Atack
- ãã¤ããªã»ã¼ãã§ãªãé¢æ°ã«NULL ãã¤ã("\x00" ã "\0" ã¨ãã¦è¡¨ãããçµç«¯æåï¼ãå«ãã¦æªæã®ã³ã¼ãã®å®è¡ãªã©èª¤åä½ãèµ·ããããã
- æå³ããªãã¹ã¯ãªããã®å®è¡ã
- å ¥åãã¼ã¿ããNULLãã¤ãæåã®åé¤ã
Directory Traversal
- "../../"ã¨ç¸å¯¾çã«ããã®ã¼ããã·ã¹ãã å ã®ä»»æãã¡ã¤ã«ã¸ã¢ã¯ã»ã¹ããæ»æã
- ã«ã¼ããã¹ã¯ã¼ããªã©ã®çªåã
- ".."ãbasename()ãªã©ã§é©åã«ç¡å¹åããã"/"ãç¦æ¢ããã
HTTP Response Splitting
- ã¬ã¹ãã³ã¹ãããã¼ã«CRLF(%0d%0a)ãå«ãã¦äºã¤ã®ã¬ã¹ãã³ã¹ã«åå²ãä¸æ£ãªãããã¼å 容ãããã£å 容ä½ãåºãæ»æã
- ä¸æ£ãªãªãã¤ã¬ã¯ããã»ãã·ã§ã³æ å ±ãæ å ±ã®çªåãXSSããã¼ã¸ã®å½è£ ããã£ãã·ã¥ã«ãã被害æ¡å¤§ã
- ãããã¼å ã«CRLF(%0d%0a)ã許å¯ããªããæè¿ã® Apache , Tomcat ã§ã¯æ¹è¡ã³ã¼ããå«ãããããç¦æ¢ãã¦ããã
Session Hijacking
- sessionIDãsessionCookieãçãã§ä»äººã確ç«ããéä¿¡è·¯ã横åãããã
- ä¸æ£ãã°ã¤ã³ãæ©å¯æ å ±ã®çªåã
- é¡æ¨ãé£ããã»ãã·ã§ã³IDãã¯ããã¼ãçæããã»ãã·ã§ã³IDãã¯ããã¼ã®æå¹æéãçãããã
Session Fixation
- ããã«ã¼ãç¨æãã sessionID ãªã©ãã¦ã¼ã¶ã«å©ç¨ããã¦éä¿¡è·¯ã横åãããã
- ä¸æ£ãã°ã¤ã³ãæ©å¯æ å ±ã®çªåã
- é©åã«XSS対çãããããã°ã¤ã³æã«æ°ããã»ãã·ã§ã³IDãçºè¡ããã
File Upload Attack
- å½è£ ããããã¡ã¤ã«ã«ã¹ã¯ãªãããä»è¾¼ã¿å®è¡ãè¡ãã
- ä¸æ£ãªã¹ã¯ãªããå®è¡ãæ©å¯æ å ±ã®æåã
- ã¢ãããã¼ãããããã¡ã¤ã«ãå½è£ ããã¦ããªããæ¤è¨¼ããããã¡ã¤ã«ãã£ã¬ã¯ããªã«ç´æ¥ã¢ã¯ã»ã¹ãããªãã
OS Command Injection
- ä¸æ£ãªOSã³ãã³ããå ¥åã«åãè¾¼ããã¨ã«ãããµã¼ãä¸ã®OSãä¸æ£ã«æä½ããæ»æã
- ã«ã¼ããã¹ã¯ã¼ããªã©ã®çªåãOSã³ãã³ãã®ä¸æ£ãªå®è¡ã
- ã³ãã³ãå®è¡ã«ãªã¯ã¨ã¹ããããå ¥åãã©ã¡ã¼ã¿ãç´æ¥å«ããªããå ¥åæååãæ£å½ãªãã®ã§ããããã§ãã¯ããã
Parameter Manipulation
- Webã¢ããªã±ã¼ã·ã§ã³ã®æå¾ ããå¤ã¨ã¯å¥ã®å¤ãéä¿¡ãã誤åä½ããããã
- æ å ±ã®æ¼æ´©ãWebã¢ããªã±ã¼ã·ã§ã³ã®èª¤ä½åã
- å ¥åããªãã¼ã¿ã«éãæ¤è¨¼æ¸ã¿ã®å¤ã使ç¨ããã
Brute force atack
- ããããæåã®çµã¿åããã¦ä¸æ£ãã°ã¤ã³ã試ã¿ãç·å½ããæ»æã
- ä¸æ£ãã°ã¤ã³ã
- ã¢ã¯ã»ã¹ééã®ç£è¦ãã¹ã¯ãªããããã®ã¢ã¯ã»ã¹ãç¦æ¢ãããç»é²æã«ç»åèªè¨¼ãå«ããã
Backdoor & Debug Options
- éçºç¨ã管çè ç¨ã®ç§å¯ã®å ¥ãå£ãæ¢ãã
- ä¸æ£ãã°ã¤ã³ã
- "admin" ã "debug=1" ãªã©åãããããå ¥å£ãé ãã
Forceful Browsing
- æ£è¦ã®èªè¨¼ãéããã«å¼·å¶çã«ãã¡ã¤ã«ããã£ã¬ã¯ããªã«ã¢ã¯ã»ã¹ããã
- æå³ããªããã¡ã¤ã«ã¸ã®ã¢ã¯ã»ã¹ã
- ãã¼ã¿ã¯å ¬éãã£ã¬ã¯ããªå¤ã¸é ç½®ãã ãã£ã¬ã¯ããªæ¨©éãæ£ããè¨å®ããã
ãããã«
æ£å¼å称ãã¯åããã¾ãããå称ãç¥ã£ã¦ããã°å¯¾çãåããããã¯ãã§ãã
ã¦ã¼ã¶ã®å
¥åãæ±ãããã®ã«ç¹æ®æåãå¿
è¦ãªå ´åã¯å°ãªãã¨æãã®ã§
ãã¯ã¤ããªã¹ãã§ç¹æ®æåãåãå
¥ããªã(ç¦æ¢)ã®ãæã£åãæ©ãã§ããããã
ããã¦ã§ãæ»æã«ã¯ãµãã¿ã¤ãºã¨ããè¨èãåºã¦ãã¾ãããç¦æ¢ã¨ç¡å¹åãæ··å¨ãã¦
ææ§ãªè¡¨ç¾ã«ãªã£ã¦ããã¿ããã§ããé«æ¨æµ©å
ããã®è¨äºãåèã«ãªãã¾ãã
http://takagi-hiromitsu.jp/diary/20051227.html
Webæ»æããããã®è©³ããã¯ä¸ã®åèãã
åèï¼é ä¸å
http://www.fortify.com.tw/vulncat/ja/vulncat/sql/header_manipulation.html
http://gihyo.jp/dev/serial/01/php-security/
http://d.hatena.ne.jp/zatsuso/20080209/p1
http://d.hatena.ne.jp/owa-tayo/20100129/1264714595
http://trac.openpne.jp/wiki/pne-spec
http://d.hatena.ne.jp/gallu/20060105/p1
http://www.itmedia.co.jp/enterprise/articles/0506/16/news030.html