tailieunhanh - Foundstone Hacme Bank v2.0™ Software Security Training Application

To understand how species became extinct millions of years ago, biologists can get clues from extinctions that have taken place over the past few centuries. When Dutch explorers arrived on Mauritius in the 1600s, for example, they killed dodos for food or sport. They also inadvertently introduced the first rats to Mau- ritius, which then proceeded to eat the eggs of the dodos. As adult and young dodos alike were killed, the population shrank until only a single dodo was left. When it died, the species was gone forever. Simply killing off individuals is not the only way to drive a species towards extinction. Habitat loss—the destruction of. | Foundstone Professional Services A DIVISION OF McAFEE Foundstone Hacme Bank Software Security Training Application User and Solution Guide Author Shanit Gupta Foundstone Inc. April 7 2006 Proprietary Foundstone Professional Services A DIVISION OF McAFEE Introduction Hacme Bank is designed to teach application developers programmers architects and security professionals how to create secure software. Hacme Bank simulates a real-world online banking application which was built with a number of known and common vulnerabilities such as SQL injection and cross-site scripting. This allows users to attempt real exploits against a web application and thus learn the specifics of the issue and how best to fix it. Foundstone uses this application extensively in our Ultimate Web Hacking and Building Secure Software training classes with great success. We have found that students in these classes appreciate the real-world nature and the ability to test their skills against an application with no legal liability. Increasingly computer attacks are migrating from the network perimeter to poorly designed and developed software applications. Fundamentally little has been done to tackle this problem with most current offerings being only piecemeal with much promise but little delivery. We believe the correct solution is to train application developers and architects about the need to design and write secure software and how to do so. As a first step in this effort it is important for this audience to see the problems in action from an attacker s perspective. This helps to identify the fundamental issues at play which make such attacks possible and what they as the application creators can do to thwart the efforts of a malicious attacker. For instance data validation has often been neglected with performance impact being cited as the primary reason for doing so. At the same time most security researchers would agree that insufficient or sadly often the absence of data validation

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.