Types of Web Attacks

DIFFERENT TYPES OF WEB BASED ATTACKS


Structured Query Language (SQL) Injection



SQL injection is a common technique that involves injecting a malicious code to alter the sensitive information in the website’s back-end database. It may also be performed to steal payment card details, username and password as well as insert spam links to the website. SQL attacks are quite easy to execute and can severely compromise the data security of a company.


Cross-Site Scripting (XSS)


Cross-site scripting (XSS) can be defined as a client-side code injection attack in which the hacker injects a malicious script, predominantly JavaScript, in a legitimate website. As these scripts appear to be from a trusted source, they are often executed by the end users. This, in turn, allows the hacker to gain access to the cookies, session tokens, passwords and other sensitive information.


Drive-By Downloads


In this type of attack, the hackers tamper a web application with an HTML code that stealthily downloads a malware whenever a user visits the website. Once downloaded, the program may execute itself to record keystrokes, access important files, hijack online banking sessions or use the computer as a part of botnet.


DoS And DDoS


Denial of service (DoS) and distributed denial of service (DDoS) attacks are carried out by flooding a website with traffic from multiple sources, making it unavailable for the genuine users. In a DoS attack, a single computer system may attempt to crash the target server with data packets. A DDoS attack is when multiple computers, widely distributed in a botnet, send simultaneous requests to slow down and ultimately halt the web server.



Veil-Framework – Open Source Tool to Bypass Common Anti-Virus Solutions

Based on python, the Veil-Framework is one of the most popular tools for Anti-Virus evasion. You can generate many different Metasploit payloads in c, python, ruby, powershell and more. The advantage of this tool is that you can add-up a layer of encryption to your payloads. With the right optimization you can bypass some common AV solutions.

Veil Installation

Veil comes with the Kali-Linux distribution and the installation is pretty easy. All you have to do is shown below.

apt-get update apt-get install veil

If you don’t have Kali you can install it from Github and run the setup file.

git clone https://github.com/Veil-Framework/Veil.git cd Veil/setup/ ./setup.sh --force --silent 

Spearfishing emails: The United States Department of Justice (DoJ) reported that around 300 universities in US and aboard were targeted by Iranian hackers. Nine of the Iranian hackers have been indicted by DoJ. Around 31 TB of data was stolen by the hackers, which is valued at around $3 billion. The hackers used spearphishing emails to trick people into revealing their personal data.

Data exposure: Data breach is when hackers forcefully infiltrate a protected system, whereas data exposure occurs when users or administrators accidently fail to secure a database or other storage mechanism. This can occur due to an oversight or simply forgetting to follow the mandated security protocol. One major case involving data exposure occurred at Exactis, which is a marketing and data aggregation firm. Around 350 million records were exposed, which may have been accessed by hackers.

Mobile app data breach: Hackers were able to infiltrate Under Armour’s MyFitnessPal app, resulting in data breach affecting 150 million users. Hackers were able to steal email addresses, usernames and passwords. Even though birth dates and credit card details were safe, it was still considered a major data breach. It is possible that hackers may have been able to crack some of the encrypted confidential data.

VPNFilter malware: Russian hackers targeted routers on a global scale, compromising around 500,000 routers in the process. A malware named VPNFilter was used to carry out the attack. The malware takes control of the router and utilizes all compromised routers to create a massive botnet. This can subsequently be used to carry out other types of cyber-attacks such as stealing data, spam campaigns, and network manipulations. Various popular routers were found to be infected such as D-Link, Netgear, Huawei, TP-Link, ASUS and Linksys.

There’s danger lurking at every step, so make sure you follow security guidelines when using internet. Always have anti-virus software installed and updated and do not click on unknown links or emails.


Comments

Popular posts from this blog

FrontEnd Courses

ActiveX

How to Type Faster