Skip to main content

Web Application Attacks , types and preventions.




With this text , we list a number of the common web application attacks, impacts, and possible mitigation. partially -1 we are covering the subsequent attacks.
  •  Local File Inclusion
  •  Malicious File Upload
  •  Clear Text Traffic
  •  Http parameter pollution attack
  •  Link Injection
  •  Session ID without session attribute
  •  Auto-Complete Attribute Not Set to Off

Local File Inclusion

Local File Inclusion is that the process of including files on a server through the online browser. This vulnerability occurs when a page include isn't properly sanitized and allows directory traversal characters to be injected.

Impact 

An attacker can gain access to the server and launch further attacks to compromise the service.

Mitigation

It is recommended to filter metacharacters from user input. make sure that the newest version of the webserver is installed and every one patches are applied.

Malicious File Upload

when the appliance has options to upload files. the appliance allows executable files also to be uploaded. this is able to allow an adversary to upload a malicious file to the online server and plan to execute it.

Impact

An attacker could also be ready to upload malicious files like Trojans or files with a malicious server-side script, potentially resulting in server compromise

Mitigation

It is recommended implementing server side validation routine which performs filtering based on:

a) File extensions, b) Content-Types, c) Magic Numbers, d) File Size

The application should validate the sort of the file that's uploaded by the user before accepting and parsing the file. more, all files uploaded should be scanned by anti-virus software updated with the newest signatures and to get rid of execute permissions on your file upload directory

Clear Text Traffic

when entire traffic is served over HTTP. a person within the middle can obtain tons of sensitive information by sniffing this cleartext traffic.

Impact

An attacker who is in a position to smell network traffic may obtain sensitive information.

Mitigation

It is recommended to implement TLS1.1, TLS 1.2 encryption

Http Parameter Pollution Attack

HTTP Parameter Pollution pollutes the HTTP parameters of an internet application so as to perform or achieve a selected malicious task/attack different from the intended behavior of the online application.

This attack are often realized is because the input isn't sanitized. HPP injects encoded query string delimiters in existing or other HTTP parameters (i.e. GET/POST/Cookie), which make it feasible to supersede parameter values that exist already to inject a replacement parameter or exploit variables from direct access.

Impact

 Supersede existing hardcoded HTTP parameters.
 Alter or modify the intended/normal application behavior.
 Access and potentially exploit variables that aren't been controlled properly.
 Bypass WAF’s rules or input validation mechanisms.

Mitigation

proper input validation should be performed

Link Injection

when Application accepts a user-controlled input that specifies a link to an external site, and uses that link during a Redirect.

Impact

The user could also be redirected to an un-trusted page that contains malware which can then compromise the user’s machine or for phishing attacks. URL redirection also facilitates CSRF(Cross-Site Request Forgery)

Mitigation


It’s recommended to disable redirection to external sites supported parameter values and implement input validation for critical parameters.

Session ID without session attribute

session attributes like “HTTPOnly”, “Secure” & “Domain” name aren't set with Session IDs.

Impact

The “HTTPOnly” attribute confirm that the cookies are often accessed via HTTP methods only. Without this attribute, other entities (mainly java code) are often wont to access the cookies.

This increases the threat posed by XSS attacks because the cookies are often stolen using them. However, if this attribute is applied, java scripts cannot access the session cookies.

Without “Secure” attribute the appliance can transfer the cookie over unencrypted channel

Without “Domain” attribute the cookie are often employed by other domains and facilitate cross-site request forgery.

Mitigation

It’s recommended to line the session attributes like HTTPOnly, Secure and name with Session ID.

Auto-Complete Attribute Not Set to Off

The value of the “AutoComplete” attribute isn't set to “off”. this enables browsers to store information entered by the user within the cache memory.

Impact

An attacker may use this flaw to recover the entered “username” and “password” from the browser cache.

Mitigation

 The attribute “autocomplete” should be added to the ASCII text file for all the input fields accepting sensitive information
 and therefore the value of this attribute should be set to “off”.

Comments

Popular posts from this blog

Alert for Weaponized TeamViewer Installer that delivers njRAT

Alert for Weaponized TeamViewer Installer that  delivers  njRAT   Hazard actors relying on legitimate, 9aaf3f374c58e8c9dcdd1ebf10256fa5 software Team Viewer for exploitation has been a totally commonplace situation. There have been numerous cases in which risk actors used 9aaf3f374c58e8c9dcdd1ebf10256fa5 software to deliver malware to the sufferers. In addition, a latest file from Cyble research & Intelligence Labs stated that the maximum popularly used remote computing device support software program, “Team Viewer” has been exploited by threat actors to deliver njRAT malware. Other software that become turning in njRAT malware include Wireshark, system Hacker, and so on., NJ RAT is a far flung get admission to Trojan that could perform keylogging, password stealing, facts exfiltration, gaining access to webcams, and microphones, downloading extra documents, and plenty of others. It changed into first determined in 2012 and was attacking companies in middle Japanese c...

SIM swap attack permits Hackers Port a phone quantity to a brand new SIM to Hack WhatsApp & Evasion 2FA.

SIM swap attack permits Hackers Port a phone quantity to a brand new SIM to Hack WhatsApp & Evasion 2FA. Cybercriminals are actively performing SIM swap attacks in diverse international locations to bypass 2 things Authentication and to compromise the numerous social media apps which include WhatsApp through porting a sufferer’s smartphone number to a brand new SIM card. This widespread assault brought on economic damages, stolen credentials, and seizes OTPs to bypass victims’ online money owed. There are various fraud facilities and thousands of operators are running round the arena to seamlessly port a cell phone wide variety to a new SIM with an excessive achievement ratio.   In this situation, countries like Brazil and Mozambique have an excessive fee of SIM swap fraud the use of various social engineering strategies, and phishing attacks. A hit tries of this assault allow fraudsters take manage of clients’ telephone numbers with a purpose to get hold of mobile money tran...

Former protection Engineer Arrested for Stealing $9 Million from Crypto alternate.

  Former protection Engineer arrested for stealing $9 Million from Crypto alternate. Shakeeb Ahmed, a former safety engineer, has been arrested for defrauding a decentralized crypto trade and stealing over $nine million. A digital currency trading, also known as a crypto currency alternate (DCE), is an enterprise that permits individuals to trade crypto currencies or digital currencies for different property, inclusive of conventional fiat money or other digital currencies. This marks the first crook case involving a smart agreement operated via a decentralized alternate. Vulnerability in Crypto exchange’s clever Contracts In July 2022, Ahmed took gain of vulnerability in clever contracts and inserted fake pricing facts, ensuing in fraudulent gains of about $9 million. He also utilized “flash loans” to defraud the crypto trade. Using his specialised capabilities as a senior protection engineer, he forcefully carried out the assault through reverse engineering smart contracts ...