...
首页> 外文期刊>Information Week >Hackers Sneak Through Open Doors In Applications
【24h】

Hackers Sneak Through Open Doors In Applications

机译:黑客偷偷打开应用程序的大门

获取原文
获取原文并翻译 | 示例
           

摘要

Not too long ago, hackers were likely to slip into a company network by foiling a poorly configured firewall or intrusion-detection system. Sometimes, it was even easier than that: Companies simply failed to install security systems. But businesses have gotten smarter and hardened their networks with properly installed security tools, so hackers are looking for other ways to slither inside. They're finding them in unprotected applications. The damage can be enormous. Applications such as sophisticated supply-chain and inventory programs, price lists, account-management programs, and even shopping carts are being targeted. Databases that link to Web applications are also vulnerable. Common attacks include E-shoplifting, a process in which hackers change price information in shopping carts. Here's how it works: A hacker puts $100 worth of items in a shopping cart and then saves the Web page to a local hard drive. He or she then modifies the price to $10 and resubmits the page. If the shopping cart is improperly coded, it might not double-check the prices and allow the price change upon resubmission.
机译:不久之前,黑客可能会通过挫败配置不良的防火墙或入侵检测系统而进入公司网络。有时,它甚至比这更容易:公司根本无法安装安全系统。但是企业已经变得越来越聪明,并使用正确安装的安全工具来加强其网络,因此黑客正在寻找其他方法来进行内部入侵。他们正在不受保护的应用程序中找到它们。损害可能是巨大的。诸如复杂的供应链和库存计划,价目表,帐户管理程序甚至购物车等应用程序都已成为目标。链接到Web应用程序的数据库也容易受到攻击。常见的攻击包括E-shoplifting,这是黑客在其中更改购物车中价格信息的过程。它是这样工作的:黑客将价值100美元的物品放入购物车,然后将网页保存到本地硬盘中。然后,他或她将价格修改为10美元,然后重新提交页面。如果购物车的编码不正确,则可能不会再次检查价格并允许在重新提交后更改价格。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号