Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Google Security IT

Google Releases a Web-App Case Study For Hackers 95

Hugh Pickens writes "The San Francisco Chronicle reports that Google has released Jarlsberg, a 'small, cheesy' web application specifically designed to be full of bugs and security flaws as a security tutorial for coders, and encourages programmers to try their hands at exploiting weaknesses in Jarlsberg as a way of teaching them how to avoid similar vulnerabilities in their own code. Jarlsberg has multiple security bugs ranging from cross-site scripting and cross-site request forgery, to information disclosure, denial of service, and remote code execution. The codelab is organized by types of vulnerabilities." (Read on for more.)
"In black box hacking, users try to find security bugs by experimenting with the application and manipulating input fields and URL parameters, trying to cause application errors, and looking at the HTTP requests and responses to guess server behavior while in white-box hacking, users have access to the source code and can use automated or manual analysis to identify bugs. The tutorial notes that accessing or attacking a computer system without authorization is illegal in many jurisdictions but while doing this codelab, users are specifically granted authorization to attack the Jarlsberg application as directed."
This discussion has been archived. No new comments can be posted.

Google Releases a Web-App Case Study For Hackers

Comments Filter:
  • by Spad ( 470073 ) <slashdot AT spad DOT co DOT uk> on Wednesday May 05, 2010 @05:20PM (#32104674) Homepage

    ...while in white-box hacking, users have access to the source code and can use automated or manual analysis to identify bugs.

    Those closed [google.com] source [android.com] bastards!

  • by lonecrow ( 931585 ) on Thursday May 06, 2010 @01:12AM (#32108224)
    OK So lets consider the two major attack types: Cross site scripting (XSS) and sql injection SQLi.

    If I am launching a XSS attack against your website I don;t really care what language its scripted in do I? I just try to defeat what ever process your using to sanitize my text.

    For a SQL injection attack I would think the database engine is more important to know than the script that is passing the crappy dynamic sql to it.

    I am not much of a hacker, I just try to defend my sites the best I can. In all my research very little is language specific.

"Can you program?" "Well, I'm literate, if that's what you mean!"

Working...