Difference between revisions of "SpoC 007 - Attacks Reference Guide - Progress Page"

From OWASP
Jump to: navigation, search
(Phase 1 - 66% Done)
m
Line 33: Line 33:
 
**[[Macro_symbol]]
 
**[[Macro_symbol]]
 
**[[Network_amplification]]
 
**[[Network_amplification]]
**[[One-click_attack]]
+
**[[One-Click_Attack]]
 
**[[OS_Injection]]
 
**[[OS_Injection]]
 
**[[OS_Command_Injection]]
 
**[[OS_Command_Injection]]
Line 81: Line 81:
  
 
** Block Access to Libraries - add as a example of [[Setting_Manipulation]]
 
** Block Access to Libraries - add as a example of [[Setting_Manipulation]]
** Buffer Overflow via Environment Variables
+
** [[Buffer_Overflow_via_Environment_Variables]]
** Cross Frame Scripting
+
** [[Cross_Frame_Scripting]]
 
** [[Denial_of_Service]] - The DoS items previously described were extracted from [[Testing_for_Denial_of_Service]] section of [[OWASP_Testing_Guide]].
 
** [[Denial_of_Service]] - The DoS items previously described were extracted from [[Testing_for_Denial_of_Service]] section of [[OWASP_Testing_Guide]].
 
** [[Embedding_Null_Code]]
 
** [[Embedding_Null_Code]]
 
** [[Man-in-the-browser_attack]]
 
** [[Man-in-the-browser_attack]]
 
** [[Manipulating_User_Permission_Identifier]]
 
** [[Manipulating_User_Permission_Identifier]]
** Overflow Binary Resource File
+
** [[Overflow_Binary_Resource_File]]
 
** [[Session_Prediction]]
 
** [[Session_Prediction]]
 
** XSS in IMG Tags
 
** XSS in IMG Tags

Revision as of 16:15, 4 November 2007

Back to Attacks Reference Guide Main Page

Back to Refresh Attacks List Main Page


The Attack reference guide is being developed by NSRAV Security R&D and Przemyslaw 'Rezos' Skowron. In order to avoid work superposition, the project was divided in 3 phases comprising the following activities:

  1. Attack list revision and description (60% of the project)
  2. Attacks categorization (20% of the project)
  3. Research and describe new attacks (20% of the project)

Total project status: 90% Done!

Contents

CheckPoints and Decision

Phase 1 - 66% Done

  • Attack List Revision: Done!

Total number of items on the Attack Guide: 91!

We noticed that Attack reference guide was previously defined based on CWE - Common Weakness Enumeration, which defines global software weakness and threats. In order to develop the Attack reference guide focused on Web application attacks, we reviewed the list and marked some items to be removed from the list. The contents of generic or redundant items were used in descriptions of some items and marked to be removed too.

Items considered to removal from the attack list: 30 items, as follows:

Phase 2 - DONE!

The attacks categorization was based on Common Attack Pattern Enumeration and Classification - CAPEC, since it is maintained by a respected entity and wide enough to fit all web application attacks.

The categories defined are:

  • Abuse of Functionality
  • Spoofing
  • Probabilistic Techniques
  • Exploitation of Authentication
  • Resource Depletion
  • Exploitation of Privilege/Trust
  • Injection (Injecting Control Plane content through the Data Plane)
  • Data Structure Attacks
  • Data Leakage Attacks
  • Resource Manipulation
  • Protocol Manipulation
  • Time and State Attacks

It was also defined the threats categorization based on WASC Threat Classification v2, under development.

Phase 3

Research and Description of new attacks(under revision):


Work Done

Note: this links were inserted here by Dinis Cruz from OWASP-NSRAV.zip file

Note2: Other items inserted and sorted by name by Leonardo Cavallari (NSRAV).


by Przemyslaw 'rezos' Skowron (20071025)


  • [[.]] - ([ diff] , [ history])