SlideShare a Scribd company logo
W EBSITE ATTACKS AND
DEFACEMENT WITH ITS CONTROL
MEASURES
 What is website defacement?
 It’s a work of system crackers.
 What are system crackers?
   -black hats, white hats
 “SQL Injection” the most common
  method
 Harmless defacement/uploading
  malware
 Second method by FTP
    What do you mean by “ATTACKS”?
    Types:
1.    Passive :
      -Read only attack
      -silent in nature
      -difficult to detect
2.    Active:
      -Data alteration or disruption
     -wide used technique(IP masquerading)
     -Denial of services(DOS)
     -Ping of death
C ONTROL             MEASURES

   For Ping of death attack:
       Prohibit creation of ICMP packets of invalid size
   For Denial of Service attack:
       Firewalls and routers at network boundaries can
        use filters to prevent spoofed packets from
        leaving the network
       Filter incoming packets with a broadcast address
       Turning off direct broadcasts on all internal
        routers
       Block known private IP addresses being used as
        destination IP (e.g., 10.0.0.0, 172.16.24.0,
        192.168.0.0, 224.0.0.0, 127.0.0.1)
 Web server- h/w and s/w

 Common use- host website

 Other uses – gaming, data
  storage, running enterprise
  application
 What is “SQL Injection”?
S OURCES OF SQL I NJECTION

   Injection through user input
    Malicious strings in web forms
   Injection through cookies
    Modified cookie fields contain attack strings
   Injection through server variables
    Headers are manipulated to contain attack strings
   Second order injection
    Trojan horse input seems fine untill used in a certain
    situation
T YPES OF SQL I NJECTIONS


   Piggy backed queries

   Tautologies

   Alternate encodings

   Inference

   Illegal/logically incorrect queries

   Union query

   Stored procedures
C OUNTER               MEASURES


   Prevention

    Augment code

    Detect vulnerabilities in code

    Safe libraries

   Detection

    detect attacks at runtime
P REVENTION               TECHNIQUES


   Penetration technique

   Defensive coding best practices

   Static analysis of code

   Safe development libraries

   Proxy filters
C ONCLUSIONS

   SQLIAs have:
   Many sources
   Many goals
   Many types
   Detection techniques can be effective, but
    limited by lack of automation
   Prevention technique can be very effective, but
    should move away from developer defence
T HANK   YOU

More Related Content

PPTX
Web defacement
PPT
Ethical hacking
PPT
ETHICAL HACKING
PPTX
PPT
Hacking Kishor
PPSX
Information Security and Ethical Hacking
PPTX
Information security & ethical hacking
PPTX
Ethical Hacking
Web defacement
Ethical hacking
ETHICAL HACKING
Hacking Kishor
Information Security and Ethical Hacking
Information security & ethical hacking
Ethical Hacking

What's hot (19)

PPTX
Ethical hacking
PPTX
Ethical hacking
PPSX
Ethical Hacking
PPTX
Ethical Hacking PPT (CEH)
PPT
Basic Introduction to hacking
ODP
Ethical hacking ppt
PPT
Ethical hacking
PPTX
Hacking
PPT
Hacker
PPTX
Ethical hacking
ODP
Introduction To Hacking
PPTX
Ethical hacking
PPTX
Ethical hacking
PPTX
Hacktrikz - Introduction to Information Security & Ethical Hacking
PPTX
Introduction ethical hacking
PPTX
Penetration testing
 
PPTX
Introduction To Ethical Hacking
PPTX
Inetsecurity.in Ethical Hacking presentation
PPTX
Black hat hackers
Ethical hacking
Ethical hacking
Ethical Hacking
Ethical Hacking PPT (CEH)
Basic Introduction to hacking
Ethical hacking ppt
Ethical hacking
Hacking
Hacker
Ethical hacking
Introduction To Hacking
Ethical hacking
Ethical hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
Introduction ethical hacking
Penetration testing
 
Introduction To Ethical Hacking
Inetsecurity.in Ethical Hacking presentation
Black hat hackers
Ad

Viewers also liked (19)

PPT
Sql injection
PPTX
SQL Injection Attacks cs586
PPT
Web application attacks using Sql injection and countermasures
PPT
SQLMAP Tool Usage - A Heads Up
PDF
Prevention of SQL Injection Attacks having XML Database
PPTX
Devouring Security XML Attack surface and Defences
PDF
Sql injection with sqlmap
PPT
Sql Injection Attacks And Defense Presentatio (1)
PPT
Sql injection
PPT
Sql Injection Attacks Siddhesh
PPT
Sql injection attack
PDF
Advanced SQL Injection: Attacks
PPTX
Understanding and preventing sql injection attacks
PPT
D:\Technical\Ppt\Sql Injection
PPTX
SQL INJECTION
PPTX
Sql injection
PPTX
Sql Injection attacks and prevention
PPT
Sql injection
PDF
3 Things Every Sales Team Needs to Be Thinking About in 2017
Sql injection
SQL Injection Attacks cs586
Web application attacks using Sql injection and countermasures
SQLMAP Tool Usage - A Heads Up
Prevention of SQL Injection Attacks having XML Database
Devouring Security XML Attack surface and Defences
Sql injection with sqlmap
Sql Injection Attacks And Defense Presentatio (1)
Sql injection
Sql Injection Attacks Siddhesh
Sql injection attack
Advanced SQL Injection: Attacks
Understanding and preventing sql injection attacks
D:\Technical\Ppt\Sql Injection
SQL INJECTION
Sql injection
Sql Injection attacks and prevention
Sql injection
3 Things Every Sales Team Needs to Be Thinking About in 2017
Ad

Similar to Website attack n defacement n its control measures (20)

PDF
01_Metasploit - The Elixir of Network Security
PPT
Day4
PPT
Web Application Security
PPT
Web Based Security
PDF
Eximbank security presentation
PPTX
Intrusion detection system
PPTX
Network security and System Admin
PPT
PPT
Windows network security
PPTX
Security Threats and Vulnerabilities-2.pptx
PPTX
Introduction to penetration testing
PPTX
Network security
PDF
Intrusion_Detection_By_loay_elbasyouni
PPT
Chapter 2
PDF
Linux Security best Practices with Fedora
PPT
ids.ppt
PPT
Hacking and its Defence
PPTX
Cyper security & Ethical hacking
PPT
DDOS (1).ppt
PPT
Anton Chuvakin on Honeypots
01_Metasploit - The Elixir of Network Security
Day4
Web Application Security
Web Based Security
Eximbank security presentation
Intrusion detection system
Network security and System Admin
Windows network security
Security Threats and Vulnerabilities-2.pptx
Introduction to penetration testing
Network security
Intrusion_Detection_By_loay_elbasyouni
Chapter 2
Linux Security best Practices with Fedora
ids.ppt
Hacking and its Defence
Cyper security & Ethical hacking
DDOS (1).ppt
Anton Chuvakin on Honeypots

More from أحلام انصارى (20)

PPTX
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
PPTX
Intention recognition for dynamic role exchange in haptic
PPT
Noise Adaptive Training for Robust Automatic Speech Recognition
PPTX
Human behaviour analysis based on New motion descriptor
PPTX
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
PDF
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
PPTX
Security issues in cloud database
PPTX
Html5 offers 5 times better ways to hijack the website
PPTX
Honey pot in cloud computing
PPT
grid authentication
PPTX
Security As A Service In Cloud(SECaaS)
PPT
Dos presentation by ahlam shakeel
PPTX
Password craking techniques
PPT
Operating system vulnerability and control
PPT
Network ssecurity toolkit
PPTX
Image forgery and security
PPTX
Image based authentication
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
Intention recognition for dynamic role exchange in haptic
Noise Adaptive Training for Robust Automatic Speech Recognition
Human behaviour analysis based on New motion descriptor
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Security issues in cloud database
Html5 offers 5 times better ways to hijack the website
Honey pot in cloud computing
grid authentication
Security As A Service In Cloud(SECaaS)
Dos presentation by ahlam shakeel
Password craking techniques
Operating system vulnerability and control
Network ssecurity toolkit
Image forgery and security
Image based authentication

Website attack n defacement n its control measures

  • 1. W EBSITE ATTACKS AND DEFACEMENT WITH ITS CONTROL MEASURES
  • 2.  What is website defacement?  It’s a work of system crackers.  What are system crackers? -black hats, white hats  “SQL Injection” the most common method  Harmless defacement/uploading malware  Second method by FTP
  • 3. What do you mean by “ATTACKS”?  Types: 1. Passive : -Read only attack -silent in nature -difficult to detect 2. Active: -Data alteration or disruption -wide used technique(IP masquerading) -Denial of services(DOS) -Ping of death
  • 4. C ONTROL MEASURES  For Ping of death attack:  Prohibit creation of ICMP packets of invalid size  For Denial of Service attack:  Firewalls and routers at network boundaries can use filters to prevent spoofed packets from leaving the network  Filter incoming packets with a broadcast address  Turning off direct broadcasts on all internal routers  Block known private IP addresses being used as destination IP (e.g., 10.0.0.0, 172.16.24.0, 192.168.0.0, 224.0.0.0, 127.0.0.1)
  • 5.  Web server- h/w and s/w  Common use- host website  Other uses – gaming, data storage, running enterprise application  What is “SQL Injection”?
  • 6. S OURCES OF SQL I NJECTION  Injection through user input Malicious strings in web forms  Injection through cookies Modified cookie fields contain attack strings  Injection through server variables Headers are manipulated to contain attack strings  Second order injection Trojan horse input seems fine untill used in a certain situation
  • 7. T YPES OF SQL I NJECTIONS  Piggy backed queries  Tautologies  Alternate encodings  Inference  Illegal/logically incorrect queries  Union query  Stored procedures
  • 8. C OUNTER MEASURES  Prevention Augment code Detect vulnerabilities in code Safe libraries  Detection detect attacks at runtime
  • 9. P REVENTION TECHNIQUES  Penetration technique  Defensive coding best practices  Static analysis of code  Safe development libraries  Proxy filters
  • 10. C ONCLUSIONS  SQLIAs have:  Many sources  Many goals  Many types  Detection techniques can be effective, but limited by lack of automation  Prevention technique can be very effective, but should move away from developer defence
  • 11. T HANK YOU