4 Most Common Web Attacking Techniques

If you want to secure your web application than first you must know about the common types of web attack and you should first attack on your web application to check that if it is vulnerable or not, for this purpose in this article we will talk about the most common type attacking technique that will cause a web server to compromise.
Cross Site Scripting

cross site scripting (XSS) is the most common type of web application flaws that reported now a days, Cross Site Scripting (XSS) is to trick the browser to execute malicious scripting commands. Unlike a lot of other web application attacks, XSS
targets the clients instead of the web application itself.
Cross Site scripting allow an attacker to perform a variety of activities including: 
  • Insertion of worm into a website
  • An attacker may insert their code to perform tabnapping
  • An attacker may complete deface the website
  • Cross site scripting may be used to hijacking the session 
  • etc.
Injection flaws


Injection flaws including SQL, Hibernate Query Language (HQL), LDAP, XPath, XQuery, XSLT, HTML, XML, OS command injection and many more, but the most common type of injection is SQL and HTML injection. Injection flaws allow an attacker to execute a command on a server. This is how an attack works:
  • The malicious codes are sent in a HTTP request. 
  • The malicious codes are extracted by a web application and passed to the interpreter. 
  • The malicious codes are executed on behalf of the web application.


Cross Site Request Forgery


Although it sounds like cross site scripting but it is different a bit, cross site request forgery also known as CSRF or XSRF, in CSRF attack the trust of the user being exploited. In this type of attack an attacker show that the website is for your(s) [user]. It is a one click attack in which user redirect to make some request without a knowledge of lagetimate user. In CSRF user have to already authenticate the website before launching the attack.
In CSRF attack an attacker may use some HTML or java embedded image technique, Typically an attacker will embed these into an email or website so when the user loads the page or email.

IMG SRC
  <img src=”http://host/?command”>
  SCRIPT SRC
  <script src=”http://host/?command”>

Information Leakage and Improper Error Handling

Error might be occur in on any web application but sometimes these errors give some valuable information about the website, error might be occur by Memory outages, null pointer exceptions, system call failure, an unavailable database, network timeouts etc, but due to misconfiguration these error may leak the information of the website. By knowing little detail about the web application server an attacker might be exploit it it on different ways like if an attacker know what services running on a port than an attacker will try to know about running operating system because the exploit available for different operating system. 


Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top 10 things to Do After Installing Kali Linux

Kali Linux is considered to be one of the best hacking distribution of this era, it is developed by Offensive Security to give an...

Become a spy in your own right with Xnspy Android spying app

Having become widely popular among parents and employers, spying apps have become quite the norm nowadays. Android spying apps have made it a lot...

e-Services Portals Potentially Expose Government Infrastructure to File-based Attacks

More and more users are embracing technology to perform their day-to-day activities. It’s not only private businesses that are forced to establish digital channels...

What is Nmap? How to use Nmap for Information Gathering

Nmap stands for Network Mapper, a powerful network scanning and host detection tool that is being used to perform reconnaissance in a very first...