mod-6
mod-6
Web Security
Common Vulnerabilities
• For a modern enterprise, effective web security has broad technical and human
benefits
• Protect your business and stay compliant by preventing loss of sensitive data
• Offer a better user experience by helping your users stay safe and productive
• Maintain customer loyalty and trust by staying secure and out of the news
Web Security Protect Against?
• Ransomware
• General malware
• Phishing
• SQL injection
• Denial of service (DoS)
• Cross-site scripting (XSS)
COMMON VULNERABILITIES
1.Sql Injection
2.Cross – Site(XSS)
3.Cross Site Request Forgery(CSRF)
4.Web Application Firewalls(WAF)
1.SQL Injection:
• They enable tasks like searching, updating, or retrieving data stored in a database. For
instance, an eCommerce web application.
Types of SQL Injection:
Impact of a Successful SQL Injection Attack:
Stolen credentials
Unauthorized access to databases.
Data alteration
Data deletion
2. Cross-site scripting (XSS)
Cross Site Scripting (XSS) is a vulnerability in a web application that allows a third
party to execute a script in the user’s browser on behalf of the web application.
Attackers often initiate an XSS attack by sending a malicious link to a user and
enticing the user to click it.
Types of Cross-site scripting (XSS)
Reflected XSS is a non-persistent form of attack, which means the attacker is responsible
for sending the payload to victims and is commonly spread via social media or email.
B. Stored XSS (cross-site scripting): Stored XSS, or persistent XSS, is commonly
the damaging XSS attack method. The attacker uses this approach to inject their payload
into the target application.
C. DOM based XSS :
• There is another type of XSS called DOM based XSS and its instances are either
reflected or stored.
• DOM-based XSS is a more advanced form of XSS attack that is only possible if the web
application writes data that the user provides to the DOM.
• This data is then read by the application and sent to the user’s browser.
• The attacker can inject their payload if the data is not handled correctly.
• The payload is stored within the DOM and only executes when data is read from the DOM.
3.Cross-Site Request Forgery (CSRF):
An attacker creates a forged request that, when run, will transfer $10,000
from a particular bank into the attacker’s account.
The attacker embeds the forged request into a hyperlink and sends it out in
bulk emails and also embeds it into websites.
The bank server receives the request, and because the victim is properly
authorized, it treats the request as legitimate and transfers the funds.
3.WEB APPLICATION FIREWALL (WAF):
A web application firewall, or WAF, is a security tool for monitoring, filtering and
blocking incoming and outgoing data packets from a web application or
website.
Types of Web Application Firewalls
2. Host-based WAF : can be fully integrated into the software of an application. This option is cheaper
than network-based WAFs and is more customizable, but it consumes extensive local server
resources, is complex to implement, and can be expensive to maintain.
3. Cloud-based WAF : an affordable, easily implemented solution, which typically does not require an
upfront investment, with users paying a monthly or annual security-as-a-service subscription. A
cloud-based WAF can be regularly updated at no extra cost, and without any effort on the part of
the user.
THANK YOU