Skip to main content
Engineering LibreTexts

8.1: Web Application Attacks

  • Page ID
    89754
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    A web application is a type of application software which runs on a webserver and can be accessed through the internet e.g. Gmail, Google search engine, Apple /Google Maps and Microsoft 365 etc. In 1991, when the concept of web was introduced, web pages were static (Only readable and non-interactive) and the users can only read the contents of the websites. HTML (Hyper Text Markup Language) is mainly used to design such static webpages. In 2000, Web 2.0 was developed and dynamic web pages were introduced, which allows the users to interact with the web pages and based on user’s input, can adjust the web content. To design a dynamic web page, besides HTML, we need to use many different technologies e.g. PhP, Javascript, VB Script, Database connector strings and python etc. The biggest advantage of using these scripting languages in designing of web pages is that one can design any security feature using the power of scripting languages. Sometimes when a user enters the data on a website, it directly stores that data in databases therefore the database connecting methods (Open Database Connectivity, Object linking & Embedding) are used to connect the web application to the database. Web application security is considered to be more difficult than protecting the networks. The typical network security devices such as Firewalls, Intrusion Detection Systems and Intrusion Prevention Systems which inspects the TCP/IP packets (filter them based on the defined rules) completely ignore the HTTP traffic. The attackers take advantage of this vulnerability and inject malicious tags or traffic and send it to application servers to deface a website, steal the contents of the database and gain unauthorized access to applications etc. Moreover, Zero Day Attacks (an attack that exploits the previously unknown vulnerability) are also the biggest threats to web applications which are growing significantly.


    8.1: Web Application Attacks is shared under a not declared license and was authored, remixed, and/or curated by LibreTexts.

    • Was this article helpful?