Web Application Threats in depth Flashcards

1
Q

General premises

A

This type of attack basically takes advantage of poorly written code and the lack of proper validation of input and output data.
Ex’s. SQL injections and cross site scripting.

  • Attacker injects malicious script into a server
  • the script is saved into a database
  • user requests data from the server
  • malicious script is loaded from the database into the server and executed along with the requested information (sort of like it’s piggy backing off the requested data)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly