Assessment and mitigation
OWASP - community focused web project - nonprofit security project focusing
on improving security for online or web-based applications
Injection Attack - exploitation that allows an attacker to submit code to a
target system in order to modify its operation or poison and corrupt the data
SQL Injection - attack on org assets - use unexpected input to alter or
compromise a web application - vulnerability of the script used to handle the
interaction between the front end (web server) and the backend db - if the
script is written defensively and includes code escape, it will reject then it is
not possible to SQL inject or metacharacter escape
XSS attacks are customers or visitors to a website
To protect
Perform input validation - limit the types of data a user provides in a form
Limit account privileges - database account should have the smallest set of
priv
Escaping a metacharacter is the process of marking the metacharacter as
merely normal or common - metacharacters are assigned special
programmatic meanings
LDAP injection - variation or an input injection attack - focus is on the
backend of the LDAP directory service - if a web server front end uses a
script to craft LDAP statements based on input from the user, then the LDAP
injection is a threat potential
XML Injection - variant of SQL where the target backend is XML application -
need input sanitization to stop
Directory traversal attack enables an attack to jump out of the web root
directory and into any part of the filesystem
XML Exploit - programming attack used to falsify information being sent to a
visitor or cause their system to give up info without authorization
1