Server Side Web Applications Attacks
Server Side Web Applications Attacks
attacks
Web server
Denial of Service is when an internet hacker causes the web to provide a response to a
large number of requests.
This causes the server to slow down or crash and users authorized to use the server will be
denied service or access.
1. DENIAL-OF-SERVICE (DOS) / DISTRIBUTED
DENIAL-OF-SERVICE (DDOS):
A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims
to render a computer or other device unavailable to its intended users by interrupting the
device's normal functioning. DoS attacks typically function by overwhelming or flooding a
targeted machine with requests until normal traffic is unable to be processed, resulting in
denial-of-service to addition users. A DoS attack is characterized by using a single
computer to launch the attack.
A distributed denial-of-service (DDoS) attack is a type of DoS attack that comes from
many distributed sources, such as a botnet DDoS attack.
Government services, credit card companies under large corporations are common victims
of this type of attack
How does a DoS attack work?
The primary focus of a DoS attack is to oversaturate the capacity of a targeted machine,
resulting in denial-of-service to additional requests.
The multiple attack vectors of DoS attacks can be grouped by their similarities.
What is the difference between a DDoS
attack and a DOS attack?
The distinguishing difference between DDoS and DoS is the number of connections
utilized in the attack. Some DoS attacks, such as “low and slow” attacks like Slowloris,
derive their power in the simplicity and minimal requirements needed to them be effective.
DoS utilizes a single connection, while a DDoS attack utilizes many sources of attack
traffic, often in the form of a botnet. Generally speaking, many of the attacks are
fundamentally similar and can be attempted using one more many sources of malicious
traffic..
DoS attacks typically fall in 2 categories:
Cross-site scripting (also known as XSS) is a web security vulnerability that allows an
attacker to compromise the interactions that users have with a vulnerable application.
Cross-site scripting (XSS) is an attack where the attacker attaches code onto a legitimate
website that will execute when the victim loads the website. That malicious code can be
inserted in several ways. Most popularly, it is either added to the end of a url or posted
directly onto a page that displays user-generated content. In more technical terms, cross-
site scripting is a client-side code injection attack.
How does XSS work?
Filter input on arrival. At the point where user input is received, filter as strictly as possible
based on what is expected or valid input.
Encode data on output. At the point where user-controllable data is output in HTTP
responses, encode the output to prevent it from being interpreted as active content. Depending
on the output context, this might require applying combinations of HTML, URL, JavaScript,
and CSS encoding.
Use appropriate response headers. To prevent XSS in HTTP responses that aren't
intended to contain any HTML or JavaScript, you can use the Content-Type and X-
Content-Type-Options headers to ensure that browsers interpret the responses in the
way you intend.
Content Security Policy. As a last line of defense, you can use Content Security Policy (CSP)
to reduce the severity of any XSS vulnerabilities that still occur.
SQL injection(SQLI)
Server side web applications attacks
What is SQL injection (SQLi)?
SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere
with the queries that an application makes to its database. It generally allows an attacker to
view data that they are not normally able to retrieve. This might include data belonging to
other users, or any other data that the application itself is able to access. In many cases, an
attacker can modify or delete this data, causing persistent changes to the application's
content or behavior.
How to detect SQL injection vulnerabilities
The majority of SQL injection vulnerabilities can be found quickly and reliably using Burp
Suite's web vulnerability scanner.
Submitting the single quote character ' and looking for errors or other anomalies.
Submitting some SQL-specific syntax that evaluates to the base (original) value of
the entry point, and to a different value, and looking for systematic differences in
the resulting application responses.
Submitting Boolean conditions such as OR 1=1 and OR 1=2, and looking for
differences in the application's responses.
Types of SQL Injection Attacks
Classic (In-Band)
Blind
Out-of-Band
Preventing a SQL Injection Attack