WebApp Sec mailing list archives
RE: Protecting posted variables
From: "Debasis Mohanty" <mail () hackingspirits com>
Date: Fri, 21 Jul 2006 23:35:59 +0530
-----Original Message----- Rogan Dawes wrote:
But other than these mechanisms, there is no standard way of
encrypting/manipulating
the form values before they are sent, that I know of.
Not exactly !! I am not sure of any other platforms but for ASP.NET programmers there exists something called _VIEWSTATE_ which takes care of most of these issues been discussed in this thread. The good part is it is tamper proof, has support for various encryption and all this comes for very few lines of extra code. To know more read - http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnaspnet/ht ml/asp11222001.asp -d ------------------------------------------------------------------------- Sponsored by: Watchfire AppScan 6.5 is now available! New features for Web Services Testing, Advanced Automated Capabilities for Penetration Testers, PCI Compliance Reporting, Token Analysis, Authentication testing, Automated JavaScript execution and much more. Download a Free Trial of AppScan today! https://www.watchfire.com/securearea/appscancamp.aspx?id=70150000000CYkc -------------------------------------------------------------------------
Current thread:
- Protecting posted variables billy . sailing (Jul 20)
- Re: Protecting posted variables Serg B. (Jul 21)
- RE: Protecting posted variables Andrew Chong (Jul 21)
- Re: Protecting posted variables mikeiscool (Jul 21)
- Re: Protecting posted variables Rogan Dawes (Jul 21)
- RE: Protecting posted variables Debasis Mohanty (Jul 21)
- Re: Protecting posted variables Meder Kydyraliev (Jul 21)
- Re: Protecting posted variables Brian Rectanus (Jul 21)
- <Possible follow-ups>
- RE: Protecting posted variables Damhuis Anton (Jul 21)