11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 16: Securing Your <strong>Web</strong> Server 423Figure 16.1 summarizes the more prevalent attacks <strong>and</strong> common vulnerabilities.InformationDisclosureSource CodeDisclosureArbitrary CodeExecutionCross SiteScriptingSQL InjectionPath TraversalProfilingPort ScansPing SweepsBanner GrabbingNetBIOS -EnumerationDenial of ServiceBuffer OverflowsSYN FloodsBrowserViruses, Worms<strong>and</strong> TrojanHorses(NIMDACode Red,others)Firewall<strong>Web</strong> Server VulnerabilitiesPoor patch managementUnnecessary services <strong>and</strong> protocolsPoor access controlNo auditingVulnerable TCP/IP stackOver privileged accounts<strong>Web</strong> ServerFirewallSQLServerFigure 16.1Prominent <strong>Web</strong> server threats <strong>and</strong> common vulnerabilitiesProfilingProfiling, or host enumeration, is an exploratory process used to gather informationabout your <strong>Web</strong> site. An attacker uses this information to attack known weak points.Vulnerabilities●●●●Common vulnerabilities that make your server susceptible to profiling include:Unnecessary protocolsOpen ports<strong>Web</strong> servers providing configuration information in bannersAttacksCommon attacks used for profiling include:●●●Port scansPing sweepsNetBIOS <strong>and</strong> server message block (SMB) enumeration

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!