web application vulnerability upload

17
Web Application Vulnerability

Upload: saidah-manan

Post on 18-Jun-2015

312 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Web application vulnerability upload

Web Application Vulnerability

Page 2: Web application vulnerability upload

OutlineIntroductionDefinitionObjectivesEntitiesThreatsPreventionConclusion

Page 3: Web application vulnerability upload

Introduction

Page 4: Web application vulnerability upload

Web AppVulnerabilities

Page 5: Web application vulnerability upload

Definition

Page 6: Web application vulnerability upload

•Web application : web-based software that provide services to users• Vulnerability: weakness which

allows attackers to reduce a system’s information assurance

Page 7: Web application vulnerability upload

Objectives

Page 8: Web application vulnerability upload

To breach a system's protection mechanisms

To take advantage or gain access to private information or system resources

To compromise the integrity or availability of application

To compromise the trust relationship between an application user and the web application

Page 9: Web application vulnerability upload

Entities

Page 10: Web application vulnerability upload

Attacker

•Unauthorized user

•Exploit the system

Victim

•Authorized user

•Weak system

Page 11: Web application vulnerability upload

Threat on Web Application

Page 12: Web application vulnerability upload

Buffer Overfl

ow

Cross-Site

Scripting (XSS)

Command injection

SQL Injecti

on

Cookie Snooping

Page 13: Web application vulnerability upload

Preventions

Page 14: Web application vulnerability upload

Avoid generation of informational

error messages

Remove HTML

comments

Use two-level

validation

Use encryption

Page 15: Web application vulnerability upload

Conclusion

Page 16: Web application vulnerability upload

A combination of application of both technologies and user awareness are

the only effective ways of truly defending against web attacks.

Page 17: Web application vulnerability upload