CEH Domain 5.pdf

infosec train
infosec trainInfosecTrain

Considering that most people have used mobile applications like PUB-G, Instagram, and WhatsApp. I will give you an example of a web application that is also a mobile app. https://www.infosectrain.com/courses/ceh-v11-certification-training/

CEH v11
Web Application Hacking
DOMAIN 5
www.infosectrain.com
www.infosectrain.com | sales@infosectrain.com 01
Domains of CEH
DOMAIN 1
Information Security &
Ethical Hacking Overview
DOMAIN 2
Reconnaissance
Techniques
DOMAIN 3
System hacking
phases
& Attack Techniques
DOMAIN 4
Network and perimeter
hacking
DOMAIN 5
Web application hacking
DOMAIN 6
Wireless network hacking
DOMAIN 7
Mobile platform, IoT,
& OT hacking
DOMAIN 8
Cloud Computing
DOMAIN 9
Cryptography
CEH v11
DOMAINS
6%
21%
17%
14%
16%
6%
8%
6%
6%
What is a Web Application?
Considering that most people have used mobile applications like PUB-G,
Instagram, and WhatsApp. I will give you an example of a web application that
is also a mobile app. Now assume you’ve lost your mobile or your mobile is
switched off, and you are willing to scroll the insta feed. What will you do? Login
to your account through Google Chrome. Right? And that’s it, as you can use
your Instagram by using a web browser. It is called a web application. A few
famous examples of web applications are Facebook, MakeMyTrip, Flipboard,
and the 2048 Game.
The technical definition of a Web Application
A web application is a software or a program that performs particular tasks by
running on any web browser like Google Chrome, Mozilla Firefox, Internet
Explorer, etc.
www.infosectrain.com | sales@infosectrain.com 02
DOMAIN 5
Web Application Hacking
In this blog, we will discuss the 5th
domain of CEH,
which is ‘Web Application Hacking’
www.infosectrain.com | sales@infosectrain.com 03
DOMAIN 5
Web Application Hacking
Hacking of Web Applications
Web hacking refers to exploiting HTTP applications by manipulating graphics,
altering the Uniform Resource Identifier (URI), or altering HTTP elements
outside the URI.
Different methods to hack web applications are:
> SQL Injection attacks
> Cross-site scripting
> Fuzzing
One of the coolest things about using web applications is you
don’t need to download them. Hence, devices will have space for
more important data.
www.infosectrain.com | sales@infosectrain.com 04
DOMAIN 5
Web Application Hacking
SQL Injection Attacks
We can use Structured Query Language to operate, query, and administrate
the data systems. The SQL injection attack is one of the prevalent SQL attacks
that attackers use to read, change, or delete data. SQL injections can also
command the operating systems to perform particular tasks.
www.infosectrain.com | sales@infosectrain.com 05
DOMAIN 5
Web Application Hacking
Cross-site Scripting
Attacks using cross-site scripting, also called XSS, involve injecting malicious
code into websites that would otherwise be safe. Using a target web
application vulnerability, an attacker can send malicious code to a user.
www.infosectrain.com | sales@infosectrain.com 06
DOMAIN 5
Web Application Hacking
Fuzzing
In software, operating systems, or networks, developers can employ fuzz
testing to identify code mistakes and security gaps. Attackers may also apply
the same method on our sites or servers to locate weaknesses.
It works by first entering a huge amount of random data (fuzz) to crash it.
Furthermore, attackers use a fuzzer software tool that is used to detect weak
areas. If the security of the target fails, the attacker might exploit it further.
www.infosectrain.com | sales@infosectrain.com 07
DOMAIN 5
Web Application Hacking
Unvalidated Inputs
Web applications accept input from the user, as queries are built on top of
that input. The attacker can launch attacks like cross-site scripting (XSS), SQL
injection attacks, and directory traversal attacks if these inputs are not
properly sanitized. This attack can also lead to identity theft and data theft.
Directory Traversal Attack
As a result of this vulnerability, the attacker can access restricted directories
on the web server in addition to the webroot directory. This would allow the
attacker to access system files, run OS commands, and find out details about
the configuration.
Defense Mechanisms
There are various defense mechanisms to control web application hacking.
Some of them are:
> Authentication
> Handling data safely
> Conducting audits
Types of vulnerabilities that cause
Web Application Hacking
www.infosectrain.com | sales@infosectrain.com 08
DOMAIN 5
Web Application Hacking
Authentication
Authentication is a defense mechanism that checks the user ID and password
to verify the users. But with the increasing social engineering techniques,
attackers can easily get your login credentials. Hence, the two-step
verification came into existence.
Two-step verification is nothing but sending a “One Time Password” to your
mobile so that only you can have the authority to login into your account
www.infosectrain.com | sales@infosectrain.com 09
Handling data safely
Most vulnerabilities in Web applications are caused by the improper
processing of user data. Vulnerabilities can frequently be overlooked, not by
verifying the input itself but by assuring safe processing. Secure Coding
approach that prevents typical issues. For example, the proper use of
parameterized database access queries can avoid attacks from SQL by
injecting.
DOMAIN 5
Web Application Hacking
www.infosectrain.com | sales@infosectrain.com 10
Conducting Audits
Effective audit logs should enable the application’s owners to understand
precisely what has happened, what vulnerability was exploited by attackers,
whether attackers got unwanted data access, or whether attackers
conducted any unauthorized actions. Audits can also provide the attacker’s
identity.
DOMAIN 5
Web Application Hacking
www.infosectrain.com | sales@infosectrain.com

Recomendados

Domain 5 of the CEH Web Application Hacking.pptx por
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxInfosectrain3
12 visualizações16 slides
How Can I Reduce The Risk Of A Cyber-Attack? por
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?Osei Fortune
1.3K visualizações4 slides
Top Application Security Threats por
Top Application Security Threats Top Application Security Threats
Top Application Security Threats ColumnInformationSecurity
13.1K visualizações12 slides
Web and Mobile Application Security por
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application SecurityPrateek Jain
790 visualizações62 slides
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap... por
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...IBM Security
1.1K visualizações29 slides
Are you fighting_new_threats_with_old_weapons por
Are you fighting_new_threats_with_old_weaponsAre you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsBhargav Modi
151 visualizações7 slides

Mais conteúdo relacionado

Similar a CEH Domain 5.pdf

Application security testing an integrated approach por
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approachIdexcel Technologies
1K visualizações11 slides
BDSE03-1121-API-PresentationTemplate.pptx por
BDSE03-1121-API-PresentationTemplate.pptxBDSE03-1121-API-PresentationTemplate.pptx
BDSE03-1121-API-PresentationTemplate.pptxSudhanshuKachhotia
1 visão18 slides
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE por
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEAjith Kp
878 visualizações41 slides
Computer security system Unit1.pptx por
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptxVIRAJDEY1
4 visualizações26 slides
A Review paper on Securing PHP based websites From Web Application Vulnerabil... por
A Review paper on Securing PHP based websites From Web Application Vulnerabil...A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...Editor IJMTER
345 visualizações11 slides
Analysis of web application penetration testing por
Analysis of web application penetration testingAnalysis of web application penetration testing
Analysis of web application penetration testingEngr Md Yusuf Miah
54 visualizações73 slides

Similar a CEH Domain 5.pdf(20)

Application security testing an integrated approach por Idexcel Technologies
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approach
Idexcel Technologies1K visualizações
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE por Ajith Kp
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
Ajith Kp878 visualizações
Computer security system Unit1.pptx por VIRAJDEY1
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptx
VIRAJDEY14 visualizações
A Review paper on Securing PHP based websites From Web Application Vulnerabil... por Editor IJMTER
A Review paper on Securing PHP based websites From Web Application Vulnerabil...A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
Editor IJMTER345 visualizações
Analysis of web application penetration testing por Engr Md Yusuf Miah
Analysis of web application penetration testingAnalysis of web application penetration testing
Analysis of web application penetration testing
Engr Md Yusuf Miah54 visualizações
Secure coding guidelines por Zakaria SMAHI
Secure coding guidelinesSecure coding guidelines
Secure coding guidelines
Zakaria SMAHI637 visualizações
Top Keys to create a secure website por Click Ripple Solutions
Top Keys to create a secure websiteTop Keys to create a secure website
Top Keys to create a secure website
Click Ripple Solutions382 visualizações
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection por Alert Logic
Reducing Your Attack Surface and Yuor Role in Cloud Workload ProtectionReducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Alert Logic 301 visualizações
DEVSECOPS_the_beginning.ppt por schwarz10
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
schwarz1011 visualizações
React security vulnerabilities por AngelinaJasper
React security vulnerabilitiesReact security vulnerabilities
React security vulnerabilities
AngelinaJasper79 visualizações
Reducing Your Attack Surface & Your Role in Cloud Workload Protection por Alert Logic
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Alert Logic 108 visualizações
C01461422 por IOSR Journals
C01461422C01461422
C01461422
IOSR Journals506 visualizações
How Does a Data Breach Happen? por Claranet UK
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
Claranet UK333 visualizações
T04505103106 por IJERA Editor
T04505103106T04505103106
T04505103106
IJERA Editor237 visualizações
Top Application Security Trends of 2012 por DaveEdwards12
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
DaveEdwards12834 visualizações
Code protection por whitecryption
Code protectionCode protection
Code protection
whitecryption52 visualizações
Cyber security por Sakib Sami
Cyber securityCyber security
Cyber security
Sakib Sami401 visualizações
Methods Hackers Use por brittanyjespersen
Methods Hackers UseMethods Hackers Use
Methods Hackers Use
brittanyjespersen1.1K visualizações
Get Ready for Web Application Security Testing por Alan Kan
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
Alan Kan3K visualizações

Mais de infosec train

free upcoming events.pdf por
free upcoming events.pdffree upcoming events.pdf
free upcoming events.pdfinfosec train
3 visualizações6 slides
SOC 2 Type 2 Checklist.pdf por
SOC 2 Type 2 Checklist.pdfSOC 2 Type 2 Checklist.pdf
SOC 2 Type 2 Checklist.pdfinfosec train
6 visualizações17 slides
Dark Web Monitoring Tools.pdf por
Dark Web Monitoring Tools.pdfDark Web Monitoring Tools.pdf
Dark Web Monitoring Tools.pdfinfosec train
2 visualizações12 slides
Unmasking the cunning.pdf por
Unmasking the cunning.pdfUnmasking the cunning.pdf
Unmasking the cunning.pdfinfosec train
2 visualizações7 slides
Targeted Ransomware.pdf por
Targeted Ransomware.pdfTargeted Ransomware.pdf
Targeted Ransomware.pdfinfosec train
2 visualizações4 slides
Dark Side of Artificial Intelligence (1).pdf por
Dark Side of Artificial Intelligence (1).pdfDark Side of Artificial Intelligence (1).pdf
Dark Side of Artificial Intelligence (1).pdfinfosec train
3 visualizações8 slides

Mais de infosec train(20)

free upcoming events.pdf por infosec train
free upcoming events.pdffree upcoming events.pdf
free upcoming events.pdf
infosec train3 visualizações
SOC 2 Type 2 Checklist.pdf por infosec train
SOC 2 Type 2 Checklist.pdfSOC 2 Type 2 Checklist.pdf
SOC 2 Type 2 Checklist.pdf
infosec train6 visualizações
Dark Web Monitoring Tools.pdf por infosec train
Dark Web Monitoring Tools.pdfDark Web Monitoring Tools.pdf
Dark Web Monitoring Tools.pdf
infosec train2 visualizações
Unmasking the cunning.pdf por infosec train
Unmasking the cunning.pdfUnmasking the cunning.pdf
Unmasking the cunning.pdf
infosec train2 visualizações
Targeted Ransomware.pdf por infosec train
Targeted Ransomware.pdfTargeted Ransomware.pdf
Targeted Ransomware.pdf
infosec train2 visualizações
Dark Side of Artificial Intelligence (1).pdf por infosec train
Dark Side of Artificial Intelligence (1).pdfDark Side of Artificial Intelligence (1).pdf
Dark Side of Artificial Intelligence (1).pdf
infosec train3 visualizações
cactus ransomware.pdf por infosec train
cactus ransomware.pdfcactus ransomware.pdf
cactus ransomware.pdf
infosec train2 visualizações
Data Protection Officer Training.pdf por infosec train
Data Protection Officer Training.pdfData Protection Officer Training.pdf
Data Protection Officer Training.pdf
infosec train1 visão
SOC SPECIALIST.pdf por infosec train
SOC SPECIALIST.pdfSOC SPECIALIST.pdf
SOC SPECIALIST.pdf
infosec train6 visualizações
How is AI used in cybersecurity.pdf por infosec train
How is AI used in cybersecurity.pdfHow is AI used in cybersecurity.pdf
How is AI used in cybersecurity.pdf
infosec train10 visualizações
Functions of Security Controls.pdf por infosec train
Functions of Security Controls.pdfFunctions of Security Controls.pdf
Functions of Security Controls.pdf
infosec train4 visualizações
20 Steps to GDPR Compliance.pdf por infosec train
20 Steps to GDPR Compliance.pdf20 Steps to GDPR Compliance.pdf
20 Steps to GDPR Compliance.pdf
infosec train1 visão
Risk Assessment Methodology.pdf por infosec train
Risk Assessment Methodology.pdfRisk Assessment Methodology.pdf
Risk Assessment Methodology.pdf
infosec train0 visão
OT ICS Security Foundation.pdf por infosec train
OT ICS Security Foundation.pdfOT ICS Security Foundation.pdf
OT ICS Security Foundation.pdf
infosec train1 visão
CHAP vs PAP.pdf por infosec train
CHAP vs PAP.pdfCHAP vs PAP.pdf
CHAP vs PAP.pdf
infosec train3 visualizações
Cloud Security Practitioner Training.pdf por infosec train
Cloud Security Practitioner Training.pdfCloud Security Practitioner Training.pdf
Cloud Security Practitioner Training.pdf
infosec train3 visualizações
ISO 27005 vs ISO 31000.pdf por infosec train
ISO 27005 vs ISO 31000.pdfISO 27005 vs ISO 31000.pdf
ISO 27005 vs ISO 31000.pdf
infosec train3 visualizações

Último

Lecture: Open Innovation por
Lecture: Open InnovationLecture: Open Innovation
Lecture: Open InnovationMichal Hron
95 visualizações56 slides
Universe revised.pdf por
Universe revised.pdfUniverse revised.pdf
Universe revised.pdfDrHafizKosar
108 visualizações26 slides
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx por
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptxOEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptxInge de Waard
165 visualizações29 slides
Chemistry of sex hormones.pptx por
Chemistry of sex hormones.pptxChemistry of sex hormones.pptx
Chemistry of sex hormones.pptxRAJ K. MAURYA
119 visualizações38 slides
Class 10 English lesson plans por
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plansTARIQ KHAN
239 visualizações53 slides
Scope of Biochemistry.pptx por
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptxshoba shoba
121 visualizações55 slides

Último(20)

Lecture: Open Innovation por Michal Hron
Lecture: Open InnovationLecture: Open Innovation
Lecture: Open Innovation
Michal Hron95 visualizações
Universe revised.pdf por DrHafizKosar
Universe revised.pdfUniverse revised.pdf
Universe revised.pdf
DrHafizKosar108 visualizações
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx por Inge de Waard
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptxOEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
Inge de Waard165 visualizações
Chemistry of sex hormones.pptx por RAJ K. MAURYA
Chemistry of sex hormones.pptxChemistry of sex hormones.pptx
Chemistry of sex hormones.pptx
RAJ K. MAURYA119 visualizações
Class 10 English lesson plans por TARIQ KHAN
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plans
TARIQ KHAN239 visualizações
Scope of Biochemistry.pptx por shoba shoba
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptx
shoba shoba121 visualizações
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf por SukhwinderSingh895865
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfCWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
SukhwinderSingh895865501 visualizações
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively por PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 457 visualizações
Nico Baumbach IMR Media Component por InMediaRes1
Nico Baumbach IMR Media ComponentNico Baumbach IMR Media Component
Nico Baumbach IMR Media Component
InMediaRes1425 visualizações
Class 10 English notes 23-24.pptx por TARIQ KHAN
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptx
TARIQ KHAN95 visualizações
NS3 Unit 2 Life processes of animals.pptx por manuelaromero2013
NS3 Unit 2 Life processes of animals.pptxNS3 Unit 2 Life processes of animals.pptx
NS3 Unit 2 Life processes of animals.pptx
manuelaromero2013102 visualizações
Plastic waste.pdf por alqaseedae
Plastic waste.pdfPlastic waste.pdf
Plastic waste.pdf
alqaseedae110 visualizações
Google solution challenge..pptx por ChitreshGyanani1
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptx
ChitreshGyanani182 visualizações
231112 (WR) v1 ChatGPT OEB 2023.pdf por WilfredRubens.com
231112 (WR) v1  ChatGPT OEB 2023.pdf231112 (WR) v1  ChatGPT OEB 2023.pdf
231112 (WR) v1 ChatGPT OEB 2023.pdf
WilfredRubens.com137 visualizações
The Open Access Community Framework (OACF) 2023 (1).pptx por Jisc
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
Jisc77 visualizações
Material del tarjetero LEES Travesías.docx por Norberto Millán Muñoz
Material del tarjetero LEES Travesías.docxMaterial del tarjetero LEES Travesías.docx
Material del tarjetero LEES Travesías.docx
Norberto Millán Muñoz68 visualizações
Are we onboard yet University of Sussex.pptx por Jisc
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
Jisc71 visualizações
STERILITY TEST.pptx por Anupkumar Sharma
STERILITY TEST.pptxSTERILITY TEST.pptx
STERILITY TEST.pptx
Anupkumar Sharma114 visualizações

CEH Domain 5.pdf

  • 1. CEH v11 Web Application Hacking DOMAIN 5 www.infosectrain.com
  • 2. www.infosectrain.com | sales@infosectrain.com 01 Domains of CEH DOMAIN 1 Information Security & Ethical Hacking Overview DOMAIN 2 Reconnaissance Techniques DOMAIN 3 System hacking phases & Attack Techniques DOMAIN 4 Network and perimeter hacking DOMAIN 5 Web application hacking DOMAIN 6 Wireless network hacking DOMAIN 7 Mobile platform, IoT, & OT hacking DOMAIN 8 Cloud Computing DOMAIN 9 Cryptography CEH v11 DOMAINS 6% 21% 17% 14% 16% 6% 8% 6% 6%
  • 3. What is a Web Application? Considering that most people have used mobile applications like PUB-G, Instagram, and WhatsApp. I will give you an example of a web application that is also a mobile app. Now assume you’ve lost your mobile or your mobile is switched off, and you are willing to scroll the insta feed. What will you do? Login to your account through Google Chrome. Right? And that’s it, as you can use your Instagram by using a web browser. It is called a web application. A few famous examples of web applications are Facebook, MakeMyTrip, Flipboard, and the 2048 Game. The technical definition of a Web Application A web application is a software or a program that performs particular tasks by running on any web browser like Google Chrome, Mozilla Firefox, Internet Explorer, etc. www.infosectrain.com | sales@infosectrain.com 02 DOMAIN 5 Web Application Hacking In this blog, we will discuss the 5th domain of CEH, which is ‘Web Application Hacking’
  • 4. www.infosectrain.com | sales@infosectrain.com 03 DOMAIN 5 Web Application Hacking Hacking of Web Applications Web hacking refers to exploiting HTTP applications by manipulating graphics, altering the Uniform Resource Identifier (URI), or altering HTTP elements outside the URI. Different methods to hack web applications are: > SQL Injection attacks > Cross-site scripting > Fuzzing One of the coolest things about using web applications is you don’t need to download them. Hence, devices will have space for more important data.
  • 5. www.infosectrain.com | sales@infosectrain.com 04 DOMAIN 5 Web Application Hacking SQL Injection Attacks We can use Structured Query Language to operate, query, and administrate the data systems. The SQL injection attack is one of the prevalent SQL attacks that attackers use to read, change, or delete data. SQL injections can also command the operating systems to perform particular tasks.
  • 6. www.infosectrain.com | sales@infosectrain.com 05 DOMAIN 5 Web Application Hacking Cross-site Scripting Attacks using cross-site scripting, also called XSS, involve injecting malicious code into websites that would otherwise be safe. Using a target web application vulnerability, an attacker can send malicious code to a user.
  • 7. www.infosectrain.com | sales@infosectrain.com 06 DOMAIN 5 Web Application Hacking Fuzzing In software, operating systems, or networks, developers can employ fuzz testing to identify code mistakes and security gaps. Attackers may also apply the same method on our sites or servers to locate weaknesses. It works by first entering a huge amount of random data (fuzz) to crash it. Furthermore, attackers use a fuzzer software tool that is used to detect weak areas. If the security of the target fails, the attacker might exploit it further.
  • 8. www.infosectrain.com | sales@infosectrain.com 07 DOMAIN 5 Web Application Hacking Unvalidated Inputs Web applications accept input from the user, as queries are built on top of that input. The attacker can launch attacks like cross-site scripting (XSS), SQL injection attacks, and directory traversal attacks if these inputs are not properly sanitized. This attack can also lead to identity theft and data theft. Directory Traversal Attack As a result of this vulnerability, the attacker can access restricted directories on the web server in addition to the webroot directory. This would allow the attacker to access system files, run OS commands, and find out details about the configuration. Defense Mechanisms There are various defense mechanisms to control web application hacking. Some of them are: > Authentication > Handling data safely > Conducting audits Types of vulnerabilities that cause Web Application Hacking
  • 9. www.infosectrain.com | sales@infosectrain.com 08 DOMAIN 5 Web Application Hacking Authentication Authentication is a defense mechanism that checks the user ID and password to verify the users. But with the increasing social engineering techniques, attackers can easily get your login credentials. Hence, the two-step verification came into existence. Two-step verification is nothing but sending a “One Time Password” to your mobile so that only you can have the authority to login into your account
  • 10. www.infosectrain.com | sales@infosectrain.com 09 Handling data safely Most vulnerabilities in Web applications are caused by the improper processing of user data. Vulnerabilities can frequently be overlooked, not by verifying the input itself but by assuring safe processing. Secure Coding approach that prevents typical issues. For example, the proper use of parameterized database access queries can avoid attacks from SQL by injecting. DOMAIN 5 Web Application Hacking
  • 11. www.infosectrain.com | sales@infosectrain.com 10 Conducting Audits Effective audit logs should enable the application’s owners to understand precisely what has happened, what vulnerability was exploited by attackers, whether attackers got unwanted data access, or whether attackers conducted any unauthorized actions. Audits can also provide the attacker’s identity. DOMAIN 5 Web Application Hacking