V Methods
V Methods
D R . J A MA L A N A S I R
Different Methods for exploiting Vulnerabilities
◦ SQL injection
◦ buffer overflows
◦ cross-site scripting (XSS) and
◦ open-source exploit kits
-instead of a name/id, the user gives you an SQL statement that you
will unknowingly run on your database.
Example:
txtUserId = getRequestString("UserId");
txtSQL = "SELECT * FROM Users WHERE UserId = " + txtUserId;
Buffer Overflow
Buffers are memory storage regions that temporarily hold data while it is being
transferred from one location to another.
A buffer overflow attack is a common cyber attack that
◦ By submitting more data in the allocated memory block, the attacker can
overwrite data.
Buffer Overflow…
Buffer Overflow, also known as a buffer overrun, buffer overflow occurs when
the amount of data in the buffer exceeds its storage capacity.
That extra data overflows into adjacent memory locations and corrupts or
overwrites the data in those location.
Cross-site scripting (XSS)
• Cross-site scripting (XSS) occurs when hackers execute malicious
JavaScript within a victim's browser.
• Poor encryption may use algorithms that have been proven to be insecure,
outdated, or compromised.
➢ Firmware vulnerability
• Firmware refers to the software embedded in hardware devices that provide
instructions for their operation.
• In contrast, C and C++ allow arbitrary pointer arithmetic with pointers implemented as
direct memory addresses with no provision for bounds checking, and thus are
potentially memory-unsafe
Buffer Over Read: an anomaly where a program, while reading data from
a buffer, overruns the buffer's boundary and reads (or tries to read) adjacent
memory.
2. software…
• Input validation errors (code injection, cross-site
scripting (XSS)
• Input validation errors occur when websites fail to properly validate user
input, leaving them vulnerable to various attacks such as
• SQL injection
• Cross-site scripting (XSS) and
• Command injection
• Email injection is also called email header injection, SMTP header injection, or mail
command injection.
2. software…
Dangling pointer: Dangling pointer is a pointer that does not point to a valid object of the appropriate
type. These are special cases of memory safety violations. More generally, dangling references and wild
references are references that do not resolve to a valid destination.
2. Software…
• Format string attacks
• The Format String exploit occurs when the submitted data of an
input string is evaluated as a command by the application.
•For example:
• (clickjacking, cross-site request forgery, FTP bounce
attack)
Clickjacking
Clickjacking is an attack that tricks a user into clicking a webpage element which is invisible or
disguised as another element.
This can cause users to innocently download malware, visit malicious web pages, provide
credentials or sensitive information, transfer money, or purchase products online.
Clickjacking is an attack that tricks users into thinking they are clicking on one thing when in fact,
they are clicking on something else.
Typically, clickjacking is performed by displaying an invisible page or HTML element, inside an
iframe, on top of the page the user sees.
Cross-site request forgery
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute
unwanted actions on a web application in which they’re currently authenticated.
A Cross-Site Request Forgery (CSRF) attack occurs when a malicious web site,
email, blog, instant message, or program tricks an authenticated user's web
browser into performing an unwanted action on a trusted site.
FTP bounce attack
An FTP Bounce Attack is a type of network attack that exploits the File Transfer
Protocol (FTP) to send outbound traffic to a device other than the intended
server.