Web application vulnerability upload

551 views
453 views

Published on

Published in: Technology, Design
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
551
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
18
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Web application vulnerability upload

  1. 1. Introduction Definition Objectives Entities Threats Prevention Conclusion
  2. 2. Introduction
  3. 3. Attacker’s accessibility Exploitation Apps flaw Web App Vulnerabilities
  4. 4. Definition
  5. 5. • Web application : web-based software that provide services to users • Vulnerability: weakness which allows attackers to reduce a system’s information assurance
  6. 6. Objectives
  7. 7. To breach a system's protection mechanisms To take advantage or gain access to private information or system resources To compromise the integrity or availability of application To compromise the trust relationship between an application user and the web application
  8. 8. Entities
  9. 9. Attacker Victim •Unauthorized user •Exploit the system •Authorized user •Weak system
  10. 10. Threat on Web Application
  11. 11. Command injection Buffer Overflow CrossSite Scripting (XSS) Cryptographic Interception Cookie Snooping SQL Injection
  12. 12. Preventions
  13. 13. Conclusion

×