Web Authentication
-
The HTTP protocol is “stateless”, which forces site/app developers to implement their own state-tracking mechanism. What does this have to do with security? How stateful communication is implemented over HTTP?
-
Why must an authenticator-token cookie be tamper-proof and unforgeable?
Web Vulnerabilities
Let us consider the following vulnerabilities?
- CSRF (Cross Site Request Forgery)
- XSS (Cross Site Scripting)
- SQLi (SQL injection)
For each of the, describe:
-
What is the attacker’s goal behind exploiting these vulnerabilities?
-
How would the attacker detect the presence of such a vulnerability in a given web application?
-
How would the attack being setup?
-
What gain can the attacker get if the attack succeeds?