eccouncil-ecihv2-7-6-1-web-application-security-threats-and-attacks
eccouncil-ecihv2-7-6-1-web-application-security-threats-and-attacks
Objectives:
Identify other Web Application Threats that IH&R team members should be
familiar with.
External Resources:
The expression “OR 1=1” evaluates to the value “TRUE,” often allowing the
enumeration of all user ID values from the database.
Attackers carryout SQL injection attacks from the web browser’s address bar,
form fields, queries, and searches.
File Injection Attack - Used to exploit “dynamic file include” mechanisms in web
applications. Enable attackers to exploit vulnerable scripts on the server to
use a remote file instead of a presumably trusted file from the local file system.
Occurs when a user is allowed to supply input for the include command dynamically,
and is not properly validated before processing. When a user provides input, the
web application passes it into “file include” commands.
Most web application frameworks support file inclusion. The attacker enters a URL
that redirects the application to the location of the malicious file, the
application executes the file script by calling specific procedures without
proper validation.
▪ A2 – Broken Authentication: Application functions related to authentication
and session management are often implemented incorrectly, allowing attackers to
compromise passwords, keys, or session tokens or to exploit other
implementation flaws to assume other users’ identities (temporarily or permanently).
▪ A3 – Sensitive Data Exposure: Many web applications and APIs do not properly
protect sensitive data, such as financial, healthcare, and PII (Personal
Identifiable Information). Attackers may steal or modify such weakly
protected data to conduct credit card fraud, identity theft, or other crimes.
Sensitive data deserves extra protection such as encryption at rest or in
transit, as well as special precautions when exchanged with the browser.
▪ A4 – XML External Entity (XXE): Many older or poorly configured XML processors
evaluate external entity references within XML documents. Attackers can use
external entities to disclose internal files using the file URI handler, internal
SMB file shares on unpatched Windows servers, internal port scanning, remote
code execution, and denial of service attacks, such as the Billion Laughs attack.