Web Application Threats in depth Flashcards
1
Q
General premises
A
This type of attack basically takes advantage of poorly written code and the lack of proper validation of input and output data.
Ex’s. SQL injections and cross site scripting.
- Attacker injects malicious script into a server
- the script is saved into a database
- user requests data from the server
- malicious script is loaded from the database into the server and executed along with the requested information (sort of like it’s piggy backing off the requested data)