DOC PREVIEW
SJSU CS 265 - Project WebGoat

This preview shows page 1 out of 2 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CS265 Spring 2009 Project 1 Groups:- Jay Jay Zhang, 005888233- Ken Chan, 005791578Project WebGoat1. Project topicThe topic we choose is “Bypass a Path Based Access Control Scheme” under Access Control Flaws. The scenario of this lesson is you only have access to one specified directory which here is “/Users/jayjay/WebGoat-5.2/tomcat/webapps/WebGoat/lesson_plans”, try to use the form to bypassthe access restriction and access some file not in this directory. 2. Topic analysisIn order to see how the form in the WebGoat page works, we installed the tool WebScarab to analysis the packages going through WebGoat projects.So after we intercept the request send from the package, we noticed that it is a HTTP Post request, only have two parameters, File and SUBMIT:3. Solve the lessonThink the tool WebScarab as the man in the middle, we can play man in the middle attack, and take advantage of the integrity flaw in this request, by changing the request parameter “File” to use path “../main.jsp”, we can access the source file of main.jsp in up level folder, following is the screen shot after we solve the lesson.4. Suggestion of fixing this flawSince this flaw is because the man in the middle can break the integrity of the request, in order to enhance the integrity we have different approachs.First, we can use Hash function with salt to enhance the integrity of the request, for example, we can add another parameter called “checksum” let the value of this parameter equal to Hash(“File=file.html&SUBMIT=View File”+timestamp), then server need to do the same calculation and verify the hash value.Another approach is we can use HTTPS instead of HTTP, since HTTPS will do key exchange and encrypt/decrypt operation between client and server, so it will impossible for somebody in the middle intercept the request and change it.Basically, the problem here is that the server doesn’t verify the user request for the access of resources. We can also implement the role-based access control scheme on top of the path-based access control scheme. Whenever a resource is accessed by a user, the server has to verify the ACLs scheme of theuser role. Only certain resources are allowed to be accessed by a certain role. This approach can restrict resource access to only authorized users. And eventhe malicious attacker Trudy bypass the path, the server will still check the ACLs of the users before allowing access to a particular


View Full Document

SJSU CS 265 - Project WebGoat

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download Project WebGoat
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Project WebGoat and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Project WebGoat 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?