SlideShare a Scribd company logo
WEBAPPLICATION
ATTACKS
Cybersecurity
WebApplicationStatistics
WebApplication
- A web application is software that runs
on a web server and can be accessed by a
user through a web browser with an active
internet connection.This differs from local
software apps, which run directly on a user’s
device. Web applications are usually easy to
install on the user’s end, and can often be
customized to meet a business’s
specifications.
WebApplicationAttacks
- Web application attacks are malicious
activities that target web applications by
exploiting vulnerabilities in their design or
implementation. These attacks can result in
unauthorized access, data theft, or other
harmful consequences.
COMPANY/PRODUCTHISTORY
To create your own,
choose a topic that
interests you.
TYPESOFWEB
APPLICATION
ATTACKS
• Cross-site scripting (XSS):
In an XSS attack, an attacker injects a piece of malicious code
onto a trusted website or web-based app. Because the user’s
browser thinks the script came from a trusted source, it will
execute the script. XSS attacks can be used to steal data or
perform other malicious acts on the visitor’s computer. While this
method is considered unsophisticated, it’s common and can do
significant harm.
CROSS-SITE
SCRIPTING(XSS)
TYPESOFWEB
APPLICATION
ATTACKS
• SQL injection (SQLI):
SQLIs occur when an attacker meddles with the
queries that a web application makes to its database. An
SQLI can allow intruders to get sensitive data from the
database. An attacker might modify or delete this data, or
inject code that can change the web application's content or
behavior.
SQLINJECTION
(SQLI)
TYPESOFWEB
APPLICATION
ATTACKS
• Path traversal:
This attack, also known as directory traversal, allows the bad actor to manipulate
paths to folders outside the web root folder, which can then be used to access web
application files, directories and commands.
• Local file inclusion:
This technique tricks the web application into exposing or running its files on the
web server. These attacks occur when the web app treats a malicious attack as “trusted
input.” An attacker may use path or directory traversal to learn about the files on the
server, and then prompt the web app to run the local file. Local file inclusions can lead
to information disclosure, XSS and remote code execution.
TYPESOFWEB
APPLICATION
ATTACKS
• DDoS attacks:
These attacks happen when an attacker bombards a server with web
requests. Attackers may use a network of compromised computers or bots to
mount this attack, which can paralyze a server and prevent legitimate visitors from
gaining access to your services.
• Cross-site request forgery (CSRF):
CSRFs occur when an attacker tricks or forces an end user to execute
unwanted actions on an application in which they are already authenticated.
TYPESOFWEB
APPLICATION
ATTACKS
• XML external entity (XXE):
This attack relies on an improperly configured XML parser
within an application’s code. This attack can lead to the disclosure
of confidential data like passwords, denial of service, server-side
request forgery and other system impacts.
XMLEXTERNAL
ENTITY(XXE):
MostcommonvulnerabilitiesinWebApplications
• Broken Access control
• Cryptographic failures
• Injection
• Insecure design
• Security misconfiguration
• Vulnerable and outdated components
• Identification and authentication failures
• Software and data integrity failures
• Security logging and monitoring failures
• Server-side request forgery
Waystoprotectagaintswebsiteattacks
• Automated vulnerability
scanning and security testing
• Web application firewalls
• Secure development testing

More Related Content

PDF
Web Application Security Tips
PPTX
Codeinjection
PPTX
PPTX
Application-security-Javascript.pptx
PPTX
webapplicationattacks-101005070110-phpapp02.pptx
PPTX
Web and Mobile Application Security
PDF
Alert logic anatomy owasp infographic
PDF
Recent cyber Attacks
Web Application Security Tips
Codeinjection
Application-security-Javascript.pptx
webapplicationattacks-101005070110-phpapp02.pptx
Web and Mobile Application Security
Alert logic anatomy owasp infographic
Recent cyber Attacks

Similar to LECTURE-DEC-6_web-application-attacks (1).pptx (20)

PPTX
3-types of attacks_Types of attacks.pptx
PPTX
Website hacking and prevention (All Tools,Topics & Technique )
PDF
The most Common Website Security Threats
PPT
Secure code practices
PDF
React security vulnerabilities
PPTX
PPTX
Web hacking refers to exploitation of applications via HTTP which can be done
PDF
T04505103106
PDF
Are you fighting_new_threats_with_old_weapons
PDF
Injection attacks
PPTX
CyberSecurityppt. pptx
PPTX
A Taken on Cyber Attacks - The Cyber Physical System.pptx
PPTX
Major Web Sever Threat.pptx
PPT
Why You Need A Web Application Firewall
PDF
Web application sec_3
PPTX
Most Common Application Level Attacks
PPT
CROSS SITE SCRIPTING.ppt
PPT
Web Application Security
PPTX
week2-cybersecurityOverview of social engineering attacks.pptx
PPTX
AW-Infs201101067.pptx
3-types of attacks_Types of attacks.pptx
Website hacking and prevention (All Tools,Topics & Technique )
The most Common Website Security Threats
Secure code practices
React security vulnerabilities
Web hacking refers to exploitation of applications via HTTP which can be done
T04505103106
Are you fighting_new_threats_with_old_weapons
Injection attacks
CyberSecurityppt. pptx
A Taken on Cyber Attacks - The Cyber Physical System.pptx
Major Web Sever Threat.pptx
Why You Need A Web Application Firewall
Web application sec_3
Most Common Application Level Attacks
CROSS SITE SCRIPTING.ppt
Web Application Security
week2-cybersecurityOverview of social engineering attacks.pptx
AW-Infs201101067.pptx
Ad

Recently uploaded (20)

PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
01-Introduction-to-Information-Management.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Lesson notes of climatology university.
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Cell Structure & Organelles in detailed.
PPTX
master seminar digital applications in india
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Classroom Observation Tools for Teachers
Chinmaya Tiranga quiz Grand Finale.pdf
Microbial diseases, their pathogenesis and prophylaxis
Module 4: Burden of Disease Tutorial Slides S2 2025
STATICS OF THE RIGID BODIES Hibbelers.pdf
O7-L3 Supply Chain Operations - ICLT Program
01-Introduction-to-Information-Management.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Anesthesia in Laparoscopic Surgery in India
Lesson notes of climatology university.
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Cell Structure & Organelles in detailed.
master seminar digital applications in india
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
2.FourierTransform-ShortQuestionswithAnswers.pdf
Microbial disease of the cardiovascular and lymphatic systems
VCE English Exam - Section C Student Revision Booklet
O5-L3 Freight Transport Ops (International) V1.pdf
Classroom Observation Tools for Teachers
Ad

LECTURE-DEC-6_web-application-attacks (1).pptx

  • 3. WebApplication - A web application is software that runs on a web server and can be accessed by a user through a web browser with an active internet connection.This differs from local software apps, which run directly on a user’s device. Web applications are usually easy to install on the user’s end, and can often be customized to meet a business’s specifications.
  • 4. WebApplicationAttacks - Web application attacks are malicious activities that target web applications by exploiting vulnerabilities in their design or implementation. These attacks can result in unauthorized access, data theft, or other harmful consequences.
  • 5. COMPANY/PRODUCTHISTORY To create your own, choose a topic that interests you.
  • 6. TYPESOFWEB APPLICATION ATTACKS • Cross-site scripting (XSS): In an XSS attack, an attacker injects a piece of malicious code onto a trusted website or web-based app. Because the user’s browser thinks the script came from a trusted source, it will execute the script. XSS attacks can be used to steal data or perform other malicious acts on the visitor’s computer. While this method is considered unsophisticated, it’s common and can do significant harm.
  • 8. TYPESOFWEB APPLICATION ATTACKS • SQL injection (SQLI): SQLIs occur when an attacker meddles with the queries that a web application makes to its database. An SQLI can allow intruders to get sensitive data from the database. An attacker might modify or delete this data, or inject code that can change the web application's content or behavior.
  • 10. TYPESOFWEB APPLICATION ATTACKS • Path traversal: This attack, also known as directory traversal, allows the bad actor to manipulate paths to folders outside the web root folder, which can then be used to access web application files, directories and commands. • Local file inclusion: This technique tricks the web application into exposing or running its files on the web server. These attacks occur when the web app treats a malicious attack as “trusted input.” An attacker may use path or directory traversal to learn about the files on the server, and then prompt the web app to run the local file. Local file inclusions can lead to information disclosure, XSS and remote code execution.
  • 11. TYPESOFWEB APPLICATION ATTACKS • DDoS attacks: These attacks happen when an attacker bombards a server with web requests. Attackers may use a network of compromised computers or bots to mount this attack, which can paralyze a server and prevent legitimate visitors from gaining access to your services. • Cross-site request forgery (CSRF): CSRFs occur when an attacker tricks or forces an end user to execute unwanted actions on an application in which they are already authenticated.
  • 12. TYPESOFWEB APPLICATION ATTACKS • XML external entity (XXE): This attack relies on an improperly configured XML parser within an application’s code. This attack can lead to the disclosure of confidential data like passwords, denial of service, server-side request forgery and other system impacts.
  • 14. MostcommonvulnerabilitiesinWebApplications • Broken Access control • Cryptographic failures • Injection • Insecure design • Security misconfiguration • Vulnerable and outdated components • Identification and authentication failures • Software and data integrity failures • Security logging and monitoring failures • Server-side request forgery
  • 15. Waystoprotectagaintswebsiteattacks • Automated vulnerability scanning and security testing • Web application firewalls • Secure development testing