Application Hacking
Application Hacking
Web Applications acts as an interface between the users and servers using
web pages that consist of script code that is supposed to be dynamically
executed. One can access web applications with the help of the internet or
intranet. Web hacking in general refers to the exploitation of applications via
Hypertext Transfer Protocol (HTTP) which can be done by manipulating the
application through its graphical web interface, tampering the Uniform
Resource Identifier (URI) or exploiting HTTP elements. Some methods that
can be used for hacking the web applications are as follows: SQL Injection
attacks, Cross-Site Scripting (XSS), Cross-Site Request Forgeries (CSRF),
Insecure Communications, etc. Below mentioned are the Application Hacking
Mechanisms :
SMTP/Email-Based Attacks
The SMTP (Simple Mail Transfer Protocol) is responsible for the transmission
of electronic mail. Due to the e-mail tracking programs, if the receiver of the
e-mail reads, forwards, modifies, or deletes an e-mail, the sender of the e-mail
must know about it. Most e-mail tracking programs work by appending a
domain name to e-mail addresses, such as xyzRead.com. The tools that allow
an ethical hacker to track e-mail messages are MailTracking.com and
eMailTracking Pro. When these tools are used by the ethical hackers, the
resulting actions and the tracks of the original email are logged. Notification
of all the actions performed on the tracked e-mail by an automatically
generated e-mail is received by the sender. Web spiders are used by
spammers who are interested in collecting e-mail addresses
Preventive Measures:
VOIP Vulnerabilities
VOIP stands for Voice Over Internet Protocol. It’s a technology that allows us
to make voice calls using a broadband Internet connection instead of a
regular phone line. Since VOIP uses the internet to function, it is prone to all
internet vulnerabilities such as DOS attacks. Online Security Mechanisms are
not able to handle VOIP that results in the daily or poor connections for your
call. VOIP is a digital file that can be easily misused. It raises additional
security concerns. These are some kinds of VOIP vulnerabilities :
Preventive Measures:
Directory Traversal
Directory Traversal attacks are also known as Unicode exploit. Windows 2000
systems running IIS are vulnerable to this type of attack. It happens only in
unpatched Windows 2000 systems and affects CGI scripts and ISAPI
extensions such as.ASP. It allows hacker’s system-level access. Unicode
converts characters of any language to a universal hexadecimal code
specification. Since it is interpreted twice and the parser only scanned the
resultant request once, hackers could sneak file requests through IIS. The
Unicode directory traversal vulnerability allows hackers to add, change,
upload or delete files and run code on the server.
Preventive Measures :
SQL Injection
An SQL injection attack, malicious code is inserted into a web form field or the
website’s code makes a system execute a command shell or arbitrary
commands. SQL servers are a high-value target since they are a common
database servers and used by many organizations to store confidential data.
1. Preventive Measure :
2. Don’t use dynamic SQL.
3. Update and patch.
4. Consider a web application firewall to filter out malicious data.
5. Discard any unwanted or unimportant database functionality.
6. Avoid connecting to your DB using an account with admin-level
privileges.
7. Continuously monitor SQL statements from database-connected
applications
8. Buy better software.
XSS
XSS also knows Cross-site scripting. Cross-site scripting vulnerabilities occur
when web applications allow users to add custom code into a URL path or
onto a website that will be seen by other users. It can be exploited to run
malicious JavaScript code on a victim’s browser. Prevention strategies for
cross-site scripting include escaping untrusted HTTP requests as well as
validating user-generated content.
Preventive Measures :
1. Filter input on arrival.
2. Encode data on output.
3. Use appropriate response headers.
4. Content Security Policy.