Web Security
Web Security
1|Page
Security Threads-
The majority of web application attacks occur through cross-site
scripting (XSS) and SQL injection attacks
3|Page
2.SQL injection attacks.
SQL injection is a web security vulnerability that allows an attacker to
interfere with the queries that an application makes to its database. It
generally allows an attacker to view data that they are not normally
able to retrieve. This might include data belonging to other users, or
any other data that the application itself is able to access. In many
cases, an attacker can modify or delete this data, causing persistent
changes to the application's content or behaviour.
In some situations, an attacker can escalate an SQL injection attack to
compromise the underlying server or other back-end infrastructure, or
perform a denial-of-service attack.
4|Page
Subverting application logic, where you can change a query to
interfere with the application's logic.
UNION attacks, where you can retrieve data from different
database tables.
Examining the database, where you can extract information
about the version and structure of the database.
Blind SQL injection, where the results of a query you control
are not returned in the application's responses.
5|Page
Security technology-
While security is fundamentally based on people and processes, there
are a number of technical solutions to consider when designing,
building and testing secure web applications. At a high level, these
solutions include:
Black box testing tools such as Web application security
scanners, vulnerability scanners and penetration testing software
White box testing tools such as static source code analysers
Fuzzing, tools used for input testing
Web application security scanner (vulnerability scanner)
Web application firewalls (WAF), used to provide firewall-type
protection at the web application layer
Password cracking tools for testing password strength and
implementation
6|Page
Conclusion
we looked at a range of issues affecting host and network security for
organizations operating web servers. We saw that practically every
business decision that you make for your computers can have
significant security impacts. Many businesses treat security as an
afterthought, something that can be added after other decisions have
already been made—such as the choice of vendor, the decision
whether or not to use consultants, and the allocated budget for
personnel.
A chapter such as this one cannot convey all the knowledge necessary
to securely operate a computer on the Internet today. This is just an
introduction to this important topic. For specific details of securing a
Unix computer on the Internet, we recommend our book Practical
Unix & Internet Security. Even though the book was published back
in 1996, much of the information that it contains is still current. That
book, combined with this one and updates from your vendor, will
provide you with the information that you need to operate a Unix
computer securely on the Internet today.
7|Page