Securing Business Apps
Rise of the White Collar Crackers
Section 4 - Conclusion
There are many many factors that go into creating a secure application.
From the obvious, like database security, right down to the actual
coding implementation and security models it is based upon.
Attacks can come in many various shapes and sizes, this paper just
mentions some. A motivated skilled attacker can pull of some pretty
creative and amazing things.
The core problem with most of this sample, (and many apps found throughout
industry) is that it used an application level security mechanism to control
the actions of the users. This means that code running on the client machine
is responsible for making the decisions to allow or deny an action.
Unless your computing environment is tightly controlled to not allow any
unauthorized programs, or you take specific anti-cracking measures in your application
you could be quite susceptible to these types of attacks.
When in doubt, have your applications audited by skilled personnel.
This paper is brought to you by Sleuth. Sleuth is a Web application auditing
toolbox that allows to you efficiently poke, prod, push, and wrench your way
into any corner of your web applications, using quick, efficient, visual tools.
Visit us on the web at http://sandsprite.com/Sleuth/
to learn more!
|