Hacking Web Application Flashcards
specifically exploits the semicolon delimited database connection strings that are constructed dynamically based on the user inputs from web applications. So, injecting parameters into a connection string using semicolons as a separator is performed for a CSPP attack.
Connection String Parameter Pollution (CSPP)
Service Oriented Architecture (SOA) vulnerability
XML denial of service issues
Injection of malicious SQL queries into user input forms
SQL Injection
Injection of malicious LDAP statements
LDAP Injection
Attacker tries to craft an input string to gain shell access to a web server
Shell injection
Injection of malicious html code (or) command through a web application
Command Injection
hacker alters the content of the web page by using HTML code and by identifying the form fields that lack valid constraints
Command Injection Attack
An attacker exploits a web application by tampering with the form and parameter of the web application and he is successful in exploiting the web application and gaining access
Security misconfiguration
The session cookies do not have the HttpOnly flag set
vulnerable XSS attack
the web application should not use random tokens.
Cross-site request forgery vulnerable web application
The first step in analyzing a web app
Identify entry points for user input