The attacks ● XSS – type 1: non-persistent – type 2: persistent – Advanced: other keywords (, prompt()) or other technologies such as Flash
The attacks ● SQL Injection – first order: non-persistent – second order: persistent
The attacks ● Cross Channel Scripting – Similar to XSS and SQLI (contains all non-XSS, non- SQLI code injection vulnerabilites) – examples: ● Xpath Injection: unsanitzed data used in XML ● Malicious File Upload ● Open Redirects: ( ● Path Traversal (
The attacks ● Session Management – credentials sent over unencrypted HTTP – weak password recovery questions – weak CAPTCHAs – predicable authentication id values – insecure session cookies
The attacks ● Cross-Site Request Forgery – Alice is logged into her bank account – Trudy sends Alice an containing a link with a request to transfer money to Trudy's account ● could require a click ( ) ● or not ( ) – When the request is sent by Alice (eg by attempting to view the image), her authentication cookie is sent with it
The attacks ● SSL/Server Config – misconfigurations in the web server or SSL
Information Leakage ● Various methods of gaining sensitive information such as database names, source code or user names – die() function – path vulnerabilities