Web Attacks Notes
Web Attacks Notes
Web Attacks Notes
SLASH BY TE
SSC-BA NK
NOTES
SLASHBYTE | SSC-BANK
1 |
Web Application Attacks
Web Application Attacks
Active Attack: Involves attempting to alter or disrupt the system, such as
modifying data or injecting malicious code.
Passive Attack: Involves eavesdropping or monitoring communications without
altering the data, such as intercepting sensitive information.
3. Injection Attacks
What: Malicious code (SQL, XML, etc.) inserted into web applications to
manipulate data.
Each attack targets a different vulnerability, but they all pose significant
security risks.
Digital Signatures
Encryption
Public-Private Key Encryption, also known as asymmetric encryption, is a
method of encrypting and decrypting data using two keys: one public and one
private. These keys are mathematically linked but cannot be derived from each
other. Here's a simplified explanation:
Type
Description
Credential
Stuffing: Attackers
Weaknesses in
use stolen
authentication
username and
mechanisms can
Broken password
2 lead to
Authentication combinations from
unauthorized
a previous data
access to user
breach to access
accounts.
accounts on other
websites.
Unencrypted data:
Improper protection A website
of sensitive data transmitting credit
(e.g., passwords, card details over
Sensitive Data
3 credit card HTTP instead of
Exposure
numbers) leading to HTTPS, making it
unauthorized easy for attackers
access. to intercept the
data.
XXE Attack: An
Vulnerabilities in attacker sends an
XML parsers XML file with
XML External allowing external external entity
4
Entities (XXE) entities to access references that
sensitive files or read local files on
perform attacks. the server, such as
/etc/passwd .
Privilege
Escalation: A
Insufficient normal user can
restrictions on what access the admin
Broken Access authenticated users panel because of
5
Control can do, leading to improper access
unauthorized control settings,
access. potentially exposing
sensitive admin
functions.
Stored XSS: An
Malicious scripts
attacker injects a
injected into
malicious script into
webpages, allowing
a comment section
Cross-Site Scripting attackers to steal
7 on a website, which
(XSS) cookies or perform
runs when other
other malicious
users view the
actions in users’
page, stealing their
browsers.
session cookies.
Remote Code
Deserialization of Execution: An
untrusted data attacker exploits a
Insecure leading to remote vulnerable
8
Deserialization code execution or deserialization
other malicious process to execute
activities. arbitrary code on a
server.
Outdated Library: A
web application
Using outdated or
uses an old version
vulnerable libraries
Using Components of the Apache
and components in
9 with Known Struts library with a
applications,
Vulnerabilities known vulnerability
exposing them to
that can be
known exploits.
exploited to gain
remote control.
No Logs: An
Lack of sufficient attacker carries out
logging and a brute force attack
monitoring to to guess
Insufficient Logging
10 detect and respond passwords, but the
& Monitoring
to security system does not
incidents in real- log these failed
time. attempts, so no
alert is generated.
1. SQL Components:
Data Definition Language (DDL): Defines the structure of the database.
3. SQL Clauses:
WHERE: Filters records based on specific conditions.
4. SQL Functions:
Aggregate Functions: Used to perform calculations on multiple rows.
5. SQL Joins:
SQL joins are used to combine data from multiple tables based on a related
column.
LEFT JOIN (OUTER): Returns all rows from the left table and matching rows
from the right table.
RIGHT JOIN (OUTER): Returns all rows from the right table and matching
rows from the left table.
FULL JOIN (OUTER): Returns rows when there is a match in one of the
tables.
6. SQL Constraints:
Constraints enforce rules on data in a table. Common constraints include:
7. Indexes:
An Index is a database object that speeds up data retrieval. It’s created on a
column (or set of columns) to improve query performance.
Usage: Simplifies complex queries, hides sensitive data, and presents data
in a customized way.
Example: CREATE VIEW view_name AS SELECT column1 FROM table_name WHERE condition;
2. Triggers:
Definition: A trigger is an automatic action that occurs when specific
events ( INSERT , UPDATE , DELETE ) happen on a table.
Example: CREATE TRIGGER trigger_name BEFORE INSERT ON table_name FOR EACH ROW SET
NEW.column = value;
3. Cursors:
Definition: A cursor is a database object that processes query results row
by row.
Each feature helps manage, manipulate, and process data in different ways,
enhancing SQL’s functionality for various tasks.
A system designed as a
A single, unified codebase
collection of small,
where all components (UI,
Definition independent services that
business logic, database)
communicate over a
are tightly integrated.
network.
Deployed as multiple
Deployment Deployed as a single unit.
independent services.
Key Differences:
Monolithic: Everything is in one place, making initial development easier
but harder to scale and maintain as it grows.