Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Wa0006

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

EXPERIMENT-4

AIM: Study of different types of vulnerabilities for hacking a websites/Web Applications.


ALGORITHM
4.1 Reasons for Attacking Web Applications
There are many privacy risks in web applications, many websites are hacked by anonymous.
They target website because of different types of reasons. They are mentioned in table 1.
4.2 Web Application Vulnerability
There are several different types of attacks used by hackers. These types of attacks and its
usage are mentioned in following Table 2.
The SQL Injection and Cross Site Scripting are the most famous vulnerabilities in web
application. Generally web servers, application servers, and web application environment are
affected to following types of vulnerabilities. The OWASP (Open Web Application Security
Project) listed all security vulnerability. There are two types of attacks which are frequently used
by hackers namely SQL Injection attack and XSS (Cross Site Scripting) Attack. The following
are the brief explanation of each type of attack.
4.2.1 SQL Injection Attack
Injection means tricking an application into including unintended commands in the data sent to
an interpreter. Interpreter take strings and interpret them as command. (SQL, OS Shell XPath,
LDAP etc.) Any web application which accepts the Zofip10. a basis of performing database
query may be vulnerable to SQL Injection, it interact with database. In this attacker exploits
input vulnerability and attempt to send incorrect command or SQL query to the web application.
By this attack hacker can Read the important information related to user (user name, password,
email) from database, also can access admin account. There are also some parts in SQL
Injection;
- Union Based SQL Injection
- String Based SQL Injection.
- Error Based SQL Injection
4.2.2 Cross Site Scripting (XSS)
In this attack hacker simply inject script in WebPages. These pages are returned to client and
malicious code will be executed in the browser of client with alert popup. And by simply
responding the web application hacks. Hacker can Access cookies, session tokens, do remote
code execution and get sensitive data. We can classify XSS into two classes' server XSS and
client XSS. There are three types of XSS:
Stored XSS
Reflected XSS
Dom based XSS
Stored XSS also known as persistent XSS This occurs when hacker stored malicious script
permanently in target server like database, visitor log.. Reflected XSS occur when hacker insert
inject script into some input field.
4.2.3 Broken Authentication/Session Management
This attack also like bypass authentication. Various actions can break the authentication no
matter its strong. If the user authentication system of website is weak then Hacker can take full
advantage he can change the password, modify account information, and get sensitive
information.
4.2.4 Cross site request forgery (CSRF)
This attack also like a XSS difference ia that here attacker create forged http request (e.g.
Update account, login logout, purchase process) and forced victim in to submitting malicious
action via image tags,XSS, or other techniques. If the user is authenticated the attack
succeeds, By this attack attacker can steal all the information or get the password or username.
4.2.5 Insecure Direct Object References.
When developer expose references to initial implementation object like file,dictionary, database
key. Without access control check or other protection attacker can manipulate these references
to access an authorized data by simply changes a parameter value.
4.2.6 Security Misconfiguration
Good security requires having a secure configuration. In these types of attack hacker accesses
default accounts, unused pages, un-patched flaws, unprotected files and dictionaries to gain
unauthorized access or for the knowledge of the system.
4.2.7 Sensitive Data Exposure
Many applications do not properly protect important information like credit card; tax ID's,
authentication Ids. Hacker may steal or change such weekly protected data to conduct credit
card fraud, id theft or other crimes. Hacker breaks steal keys, do man in middle attacks or steal
clear text data of the server while transit or from user's browser.
4.2.8 Using Components with Known Vulnerability
Components like frameworks or software module always run with full privileges. If vulnerable
component exploited then attack can facilitate important data loss. In this hacker search a weak
component by scanning. He customizes the exploit as need and executes the attack.
4.2.9 Invalidated Redirects and Forwards
Generally web application redirects users to another page or website and use un-trusted data to
consider designation pages without proper validation. Hacker can redirect victim to phishing
site. Hacker links to redirect and forced victim to click. Since the link is to a valid site. Attacker
targets unsafe forward to bypass authentication.
4.2.10 Missing Function Level Access Control
Mostly web applications verify function level rights before making that visible in the UI.
Application need to perform the same access control checks on the server when each function
is accessed. If request are not verified hacker, it will be able to forge requests in order to access
functionality without proper authorization. Hacker who is authorized user simply changes the
URL or a parameter to privileged system. He can also access private functions that aren't
protected.
RESULT:The above procedure was studied and understood.

EX.NO: 7
AIM ::Security issues in our college website website name: nejrucolleges.net
STEP I: Go to clickjacking test website used to clone loging page of website (vulnerable)
2. copy the URL of college website, paste in clickjacking online tool
3 click test
4 It displays a it is vulnerable to dickjacking attack.
STEP 2:
copy the server version of college website paste in google browser.vulnerability in te
server version"
It displays all the possible vulnerabilities in the website
out of bound read Directory traversal (HTTP exploit) Access the data with inoproper
encoding
STEP3:
Host beader Injection may occur If there is not properly set the beader of website
The above Security Issues are Identified in our college website.

EX: NO:8

To identify security issues in facebook

STEP:1
1. Go to clickjacking test website used to clone login page
2. Copy URL OF 'FACEBOOK' and paste in Clickjacking online tool.
3 Click "TEST"
4 It displays 'It is not vulnerable to clickjacking attack
STEP2
1. copy the server version of FACEBOOK and Paste in google browser as Vulnerability in
server version"
It displays all the possible Vulcerabilities in webpage-
STEP3:
Host header injection may occur if beader of website is not set properly.

EX-NO:9
AIM
To identify security issues in social web application (whatsapp)
ALDIORITHM
STEP1: Malware exploits via video calls
STEP 2: To do pay phishing scaros Criminals can send links to to victinos victims to
infect their devices with malware
STEP 3: By Sharing credentials with Meta" the personal privacy is not Gop ensured.
STEP4: Handling unencrypted backups So the data backups used in whatsapp are risk of
data breach.
The above security issues are analysed Successfully

AIM-10
To ensure security in seach Engine
ALGORITHM
STEP:1
Enayption is the most basic and Important security issue in any seach Engine.
Check cohether the URL baving bttps:// Instead of http://
PREVENTION: Avoid clicking an URL not baving https://
STEP 2:
Next security issue in tracking Tracking the user activities in website is searchin theis
search history
main tool for tracking cookies - small file that store information about Users browsing
activity
CAUTION: Delete cookies regularly. block them from certain sites use private or
incognito mode.
STEP 3
Pasonalization and filter bubbles: ases users being exposed to only a limited
andbiasedrange of information. Filter bubbles cas limit users access to diverse and
challenging perspectives and make them more vulnerable to misinformation and
manipulation
Search engine security was Successfully

You might also like