Home > slashdot > Google Releases a Web-App Case Study For Hackers

Google Releases a Web-App Case Study For Hackers

May 5th, 2010 05:49 admin Leave a comment Go to comments

Hugh Pickens writes “The San Francisco Chronicle reports that Google has released Jarlsberg, a ‘small, cheesy’ web application specifically designed to be full of bugs and security flaws as a security tutorial for coders, and encourages programmers to try their hands at exploiting weaknesses in Jarlsberg as a way of teaching them how to avoid similar vulnerabilities in their own code. Jarlsberg has multiple security bugs ranging from cross-site scripting and cross-site request forgery, to information disclosure, denial of service, and remote code execution. The codelab is organized by types of vulnerabilities.” (Read on for more.)

“In black box hacking, users try to find security bugs by experimenting with the application and manipulating input fields and URL parameters, trying to cause application errors, and looking at the HTTP requests and responses to guess server behavior while in white-box hacking, users have access to the source code and can use automated or manual analysis to identify bugs. The tutorial notes that accessing or attacking a computer system without authorization is illegal in many jurisdictions but while doing this codelab, users are specifically granted authorization to attack the Jarlsberg application as directed.”

Source: Google Releases a Web-App Case Study For Hackers

Related Articles:

  1. Google Ups Bug Bounty To $20,000
  2. Serious Web Vulnerabilities Dropped In 2011
  3. Google Releases Chrome 6, Pays $4337 In Bounties
  4. Facebook To Pay Hackers For Bugs
  5. Google To Pay $500 For Bugs Found In Chromium
blog comments powered by Disqus