SlideShare a Scribd company logo
Copyright EC-Council 2020. All Rights Reserved.​
Certified Application
Security Engineer (CASE)
Most Common Application Level Attacks
SQL Injection Attack
Cross-Site Scripting (XSS) Attacks
Parameter Tampering
DirectoryTraversal
Denial-of-Service (DoS) Attack
Session Attacks
Cross-Site Request Forgery
(CSRF) Attack
Most Common
Application
Level Attacks
SQL Injection Attack:
Most of the prominent data breaches that occur
today have been the outcomes of an SQL
Injection attack, which has led to regulatory penalties
and reputational damages. An effective SQL
Injection attack can lead to unapproved access to
delicate data, including credit card information, PINs,
or other private information regarding a customer.
Cross-Site Scripting
(XSS) Attack:
This attack disrupts the interaction between users and
vulnerable applications. It is based on client-side code
injection. The attacker inserts malicious scripts into a
legit application to alter its original intention.
Web parameter tampering attack is based on the
manipulation of parameters exchanged between
client and server in order to modify application data,
such as user credentials and permissions, price and
quantity of products, etc.
Parameter Tampering
File path traversal is also known as directory traversal or
backtracking. The primary objective of this web application
attack is to access files and directories which are not placed
under the ‘root directory’.
Directory Traversal
It is a type of cyberattack that occurs when an attacker
seeks to render a computer or other networks inaccessible
to its authorized users by momentarily or permanently
interrupting the normal operations of a host linked to the
Internet.
Denial-of-Service (DoS) Attack
DoS
Session hijacking is an attack over user
sessions by masquerading as an authorized
user. It is generally applicable to browser
sessions and web applications hacking. You can
understand session hijacking as a form of Man-
in-the-Middle (MITM) attack.
Session Attack:
Cross site request forgery — also known as CSRF or
XSRF — is one of the web-related security threats on
the OWASP top-ten list. The main principle behind a
CSRF attack is exploitation of a site’s trust for a
particular user, clandestinely utilizing the user’s
authentication data.
Cross-Site Request forgery ( CSRF) Attack:
To Learn More,
Visit -
https://www.eccouncil.org/programs/certified-application-security-engineer-case/
THANK YOU!

More Related Content

What's hot (20)

PPTX
Top 10 web server security flaws
tobybear30
 
PPTX
Web Server Web Site Security
Steven Cahill
 
PPT
this is test for today
DreamMalar
 
PPTX
Network attacks
Manjushree Mashal
 
PDF
Web Server Security Guidelines
webhostingguy
 
PPTX
Malicion software
A. Shamel
 
PDF
Phishing Attacks: A Challenge Ahead
eLearning Papers
 
PPTX
Access control attacks by Yaakub bin Idris
Hafiza Abas
 
PPTX
Security vulnerability
A. Shamel
 
PPTX
ETHICAL HACKING PPT
Sweta Leena Panda
 
PPT
Information security
Sathyanarayana Panduranga
 
PDF
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Software Guru
 
PPTX
External Attacks Against Pivileged Accounts
Lindsay Marsh
 
PDF
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
BeyondTrust
 
PPTX
Security Testing
BOSS Webtech
 
PPTX
Types of cyber attacks
krishh sivakrishna
 
PDF
Security in Computing and IT
Komalah Nair
 
PDF
Alert logic anatomy owasp infographic
CMR WORLD TECH
 
PPTX
Ethical Hacking
Mazenetsolution
 
PPT
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Schipul - The Web Marketing Company
 
Top 10 web server security flaws
tobybear30
 
Web Server Web Site Security
Steven Cahill
 
this is test for today
DreamMalar
 
Network attacks
Manjushree Mashal
 
Web Server Security Guidelines
webhostingguy
 
Malicion software
A. Shamel
 
Phishing Attacks: A Challenge Ahead
eLearning Papers
 
Access control attacks by Yaakub bin Idris
Hafiza Abas
 
Security vulnerability
A. Shamel
 
ETHICAL HACKING PPT
Sweta Leena Panda
 
Information security
Sathyanarayana Panduranga
 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Software Guru
 
External Attacks Against Pivileged Accounts
Lindsay Marsh
 
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
BeyondTrust
 
Security Testing
BOSS Webtech
 
Types of cyber attacks
krishh sivakrishna
 
Security in Computing and IT
Komalah Nair
 
Alert logic anatomy owasp infographic
CMR WORLD TECH
 
Ethical Hacking
Mazenetsolution
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Schipul - The Web Marketing Company
 

Similar to Most Common Application Level Attacks (20)

PDF
Recent cyber Attacks
S.M. Towhidul Islam
 
PPTX
webapplicationattacks-101005070110-phpapp02.pptx
SyedAliShahid3
 
PPTX
Major Web Sever Threat.pptx
SANDEEPVISHWAKARMA425010
 
PDF
Are you fighting_new_threats_with_old_weapons
Bhargav Modi
 
PPTX
Types of Cyber Attacks
Rubal Sagwal
 
PDF
Web application sec_3
vhimsikal
 
PDF
Web Application Security Tips
tcellsn
 
PDF
Study of Web Application Attacks & Their Countermeasures
idescitation
 
PDF
cyber security
Naveed Ahmed Siddiqui
 
PPTX
LECTURE-DEC-6_web-application-attacks (1).pptx
JhonFrancisDuarte
 
PPTX
Cyber Security Acronyms Glossary.pptx
SmartScanner
 
PDF
The most Common Website Security Threats
HTS Hosting
 
PPTX
cryptography .pptx
RRamyaDevi
 
PDF
Preventing Web-Proxy Based DDoS using Request Sequence Frequency
IOSR Journals
 
PDF
K017135461
IOSR Journals
 
PDF
XSS, LFI & CSRF vulnerabilities
CTM360
 
PPTX
DOS attack.pptx
HrudayBGowda
 
PPTX
Web security landscape Unit 3 part 2
Dr. SURBHI SAROHA
 
PPTX
Exploring Web Security Threats: A Practical Study on SQL Injection and CSRF
Boston Institute of Analytics
 
PPT
CROSS SITE SCRIPTING.ppt
yashvirsingh48
 
Recent cyber Attacks
S.M. Towhidul Islam
 
webapplicationattacks-101005070110-phpapp02.pptx
SyedAliShahid3
 
Major Web Sever Threat.pptx
SANDEEPVISHWAKARMA425010
 
Are you fighting_new_threats_with_old_weapons
Bhargav Modi
 
Types of Cyber Attacks
Rubal Sagwal
 
Web application sec_3
vhimsikal
 
Web Application Security Tips
tcellsn
 
Study of Web Application Attacks & Their Countermeasures
idescitation
 
cyber security
Naveed Ahmed Siddiqui
 
LECTURE-DEC-6_web-application-attacks (1).pptx
JhonFrancisDuarte
 
Cyber Security Acronyms Glossary.pptx
SmartScanner
 
The most Common Website Security Threats
HTS Hosting
 
cryptography .pptx
RRamyaDevi
 
Preventing Web-Proxy Based DDoS using Request Sequence Frequency
IOSR Journals
 
K017135461
IOSR Journals
 
XSS, LFI & CSRF vulnerabilities
CTM360
 
DOS attack.pptx
HrudayBGowda
 
Web security landscape Unit 3 part 2
Dr. SURBHI SAROHA
 
Exploring Web Security Threats: A Practical Study on SQL Injection and CSRF
Boston Institute of Analytics
 
CROSS SITE SCRIPTING.ppt
yashvirsingh48
 
Ad

More from EC-Council (20)

PPTX
Skills that make network security training easy
EC-Council
 
PPTX
Can Cloud Solutions Transform Network Security
EC-Council
 
PPTX
What makes blockchain secure: Key Characteristics & Security Architecture
EC-Council
 
PPTX
6 Most Popular Threat Modeling Methodologies
EC-Council
 
PPTX
Journey from CCNA to Certified Network Defender v2
EC-Council
 
PDF
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
EC-Council
 
PPTX
Red Team vs. Blue Team
EC-Council
 
PDF
Why Threat Intelligence Is a Must for Every Organization?
EC-Council
 
PDF
Why Digital Forensics as a Career?
EC-Council
 
PPTX
Cryptography in Blockchain
EC-Council
 
PPTX
A Brief Introduction to Penetration Testing
EC-Council
 
PPTX
Computer Hacking Forensic Investigator - CHFI
EC-Council
 
PPTX
Pasta Threat Modeling
EC-Council
 
PPTX
Blockchain: Fundamentals & Opportunities​
EC-Council
 
PPTX
Cybersecurity Audit
EC-Council
 
PPTX
Third Party Risk Management
EC-Council
 
PPTX
Types of malware threats
EC-Council
 
PPTX
Business Continuity & Disaster Recovery
EC-Council
 
PPTX
Threat Intelligence Data Collection & Acquisition
EC-Council
 
PPTX
Information Security Management
EC-Council
 
Skills that make network security training easy
EC-Council
 
Can Cloud Solutions Transform Network Security
EC-Council
 
What makes blockchain secure: Key Characteristics & Security Architecture
EC-Council
 
6 Most Popular Threat Modeling Methodologies
EC-Council
 
Journey from CCNA to Certified Network Defender v2
EC-Council
 
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
EC-Council
 
Red Team vs. Blue Team
EC-Council
 
Why Threat Intelligence Is a Must for Every Organization?
EC-Council
 
Why Digital Forensics as a Career?
EC-Council
 
Cryptography in Blockchain
EC-Council
 
A Brief Introduction to Penetration Testing
EC-Council
 
Computer Hacking Forensic Investigator - CHFI
EC-Council
 
Pasta Threat Modeling
EC-Council
 
Blockchain: Fundamentals & Opportunities​
EC-Council
 
Cybersecurity Audit
EC-Council
 
Third Party Risk Management
EC-Council
 
Types of malware threats
EC-Council
 
Business Continuity & Disaster Recovery
EC-Council
 
Threat Intelligence Data Collection & Acquisition
EC-Council
 
Information Security Management
EC-Council
 
Ad

Recently uploaded (20)

PPTX
How to Configure Storno Accounting in Odoo 18 Accounting
Celine George
 
PDF
Federal dollars withheld by district, charter, grant recipient
Mebane Rash
 
PPTX
How to Consolidate Subscription Billing in Odoo 18 Sales
Celine George
 
PPTX
Gall bladder, Small intestine and Large intestine.pptx
rekhapositivity
 
PPTX
HIRSCHSPRUNG'S DISEASE(MEGACOLON): NURSING MANAGMENT.pptx
PRADEEP ABOTHU
 
PDF
FULL DOCUMENT: Read the full Deloitte and Touche audit report on the National...
Kweku Zurek
 
PDF
Living Systems Unveiled: Simplified Life Processes for Exam Success
omaiyairshad
 
PPTX
Mrs Mhondiwa Introduction to Algebra class
sabinaschimanga
 
PDF
IMP NAAC REFORMS 2024 - 10 Attributes.pdf
BHARTIWADEKAR
 
PPTX
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
PPTX
ANORECTAL MALFORMATIONS: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
PDF
Ziehl-Neelsen Stain: Principle, Procedu.
PRASHANT YADAV
 
PPTX
LEGAL ASPECTS OF PSYCHIATRUC NURSING.pptx
PoojaSen20
 
PPSX
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
PPTX
Nutri-QUIZ-Bee-Elementary.pptx...................
ferdinandsanbuenaven
 
PPTX
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
PPTX
GENERAL METHODS OF ISOLATION AND PURIFICATION OF MARINE__MPHARM.pptx
SHAHEEN SHABBIR
 
PPTX
How to Define Translation to Custom Module And Add a new language in Odoo 18
Celine George
 
PPTX
Maternal and Child Tracking system & RCH portal
Ms Usha Vadhel
 
PPTX
ABDOMINAL WALL DEFECTS:GASTROSCHISIS, OMPHALOCELE.pptx
PRADEEP ABOTHU
 
How to Configure Storno Accounting in Odoo 18 Accounting
Celine George
 
Federal dollars withheld by district, charter, grant recipient
Mebane Rash
 
How to Consolidate Subscription Billing in Odoo 18 Sales
Celine George
 
Gall bladder, Small intestine and Large intestine.pptx
rekhapositivity
 
HIRSCHSPRUNG'S DISEASE(MEGACOLON): NURSING MANAGMENT.pptx
PRADEEP ABOTHU
 
FULL DOCUMENT: Read the full Deloitte and Touche audit report on the National...
Kweku Zurek
 
Living Systems Unveiled: Simplified Life Processes for Exam Success
omaiyairshad
 
Mrs Mhondiwa Introduction to Algebra class
sabinaschimanga
 
IMP NAAC REFORMS 2024 - 10 Attributes.pdf
BHARTIWADEKAR
 
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
ANORECTAL MALFORMATIONS: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
Ziehl-Neelsen Stain: Principle, Procedu.
PRASHANT YADAV
 
LEGAL ASPECTS OF PSYCHIATRUC NURSING.pptx
PoojaSen20
 
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
Nutri-QUIZ-Bee-Elementary.pptx...................
ferdinandsanbuenaven
 
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
GENERAL METHODS OF ISOLATION AND PURIFICATION OF MARINE__MPHARM.pptx
SHAHEEN SHABBIR
 
How to Define Translation to Custom Module And Add a new language in Odoo 18
Celine George
 
Maternal and Child Tracking system & RCH portal
Ms Usha Vadhel
 
ABDOMINAL WALL DEFECTS:GASTROSCHISIS, OMPHALOCELE.pptx
PRADEEP ABOTHU
 

Most Common Application Level Attacks

  • 1. Copyright EC-Council 2020. All Rights Reserved.​ Certified Application Security Engineer (CASE) Most Common Application Level Attacks
  • 2. SQL Injection Attack Cross-Site Scripting (XSS) Attacks Parameter Tampering DirectoryTraversal Denial-of-Service (DoS) Attack Session Attacks Cross-Site Request Forgery (CSRF) Attack Most Common Application Level Attacks
  • 3. SQL Injection Attack: Most of the prominent data breaches that occur today have been the outcomes of an SQL Injection attack, which has led to regulatory penalties and reputational damages. An effective SQL Injection attack can lead to unapproved access to delicate data, including credit card information, PINs, or other private information regarding a customer.
  • 4. Cross-Site Scripting (XSS) Attack: This attack disrupts the interaction between users and vulnerable applications. It is based on client-side code injection. The attacker inserts malicious scripts into a legit application to alter its original intention.
  • 5. Web parameter tampering attack is based on the manipulation of parameters exchanged between client and server in order to modify application data, such as user credentials and permissions, price and quantity of products, etc. Parameter Tampering
  • 6. File path traversal is also known as directory traversal or backtracking. The primary objective of this web application attack is to access files and directories which are not placed under the ‘root directory’. Directory Traversal
  • 7. It is a type of cyberattack that occurs when an attacker seeks to render a computer or other networks inaccessible to its authorized users by momentarily or permanently interrupting the normal operations of a host linked to the Internet. Denial-of-Service (DoS) Attack DoS
  • 8. Session hijacking is an attack over user sessions by masquerading as an authorized user. It is generally applicable to browser sessions and web applications hacking. You can understand session hijacking as a form of Man- in-the-Middle (MITM) attack. Session Attack:
  • 9. Cross site request forgery — also known as CSRF or XSRF — is one of the web-related security threats on the OWASP top-ten list. The main principle behind a CSRF attack is exploitation of a site’s trust for a particular user, clandestinely utilizing the user’s authentication data. Cross-Site Request forgery ( CSRF) Attack:
  • 10. To Learn More, Visit - https://www.eccouncil.org/programs/certified-application-security-engineer-case/