Back to Results
First PageMeta Content
HTTP / Cyberwarfare / HTTP cookie / Internet privacy / Session ID / Cross-site scripting / Session / Password / Login / Network protocols / Computer security / Computing


iALERT White Paper Brute-Force Exploitation of Web Application Session IDs By David Endler Director, iDEFENSE Labs
Add to Reading List

Document Date: 2008-11-02 15:44:44


Open Document

File Size: 482,61 KB

Share Result on Facebook

City

WITH SESSION / Chantilly / /

Company

Amazon / eBay / Cracking Freeservers.com. / iDEFENSE Inc. / iDEFENSE Labs / Microsoft / /

Currency

USD / /

/

/

IndustryTerm

cross-site / invitation services / Web Application Session IDs / web ecommerce systems / web-based e-mail / web application / Web Application Session IDs By David Endler / target web application / online card / web browser / retail websites / legitimate web application user / Internet address / retail shopping carts / web sessions / web requests / web servers / web session / web-based applications / cryptographic algorithms / linear algorithms / web accounts / web page activity / web server / online actions / online greeting cards / intrusion-detection systems / Internet Explorer / online miscreant / /

OperatingSystem

Unix / Windows 2000 / /

Organization

MIT / /

Person

David Endler / Kevin Fu / /

/

Position

Domain Manager / Director / /

Product

Apache / /

ProgrammingLanguage

C / HTML / Perl / C++ / /

ProvinceOrState

Virginia / /

Technology

Unix / Perl / operating system / HTML / SSL / artificial intelligence / HTTP / web server / /

URL

http /

SocialTag