How many types of Attack in F5 ASM
How many Attack Type in F5 ASM -
We can discuss how many types of attacks in F5 ASM -
Attack Type | Explanation |
Buffer overflow | Buffer overflow exploits are attacks that alter the flow on an application by overwriting parts of memory. |
Directory indexing | Automatic directory listing/indexing is a web server function that lists all of the files within a requested directory if the normal base file is not present. |
Authentication/authorization attacks | Authentication section covers attacks that target a website's method of validating the identity of a user, service, or application. The authorization section covers attacks that target a website's method of determining if a user, service, or application has the necessary permissions to perform requested action. |
Information leakage | Information leakage is when a website reveals sensitive data, such as developer comments or error messages, which may aid an attacker in exploiting the system. |
Predictable resource location | Predictable resource location is an attack technique used to uncover hidden website content and functionality. |
Command execution | Command Execution. Many web applications call operating system processes via the command line. If your application calls out to the OS, you need to be sure command strings are securely constructed. |
Vulnerability scan | A vulnerability scan is an attack technique that uses an automated security program to probe a web application for software vulnerabilities. |
Brute force | Brute force attack is an outside attempt by hackers to access post-logon pages of a website by guessing usernames and passwords; |
Brute Force Meaning A Brute Force attack can be defined as an error or trial technique used by various application programs for decoding encrypted data like DES (Data Encryption Standard) or password keys. An application of Brute Force attack proceeds from each possible set of legal characters within the sequence.. | |
Denial of Service | Denial of service (DoS) is an attack technique that overwhelms system resources to prevent a web site from serving normal user activity. |
Trojan/Backdoor/Spyware | Attackers use Trojan horse, backdoor, and spyware attacks to try to circumvent a web servers or web applications built-in security by masking the attack within a legitimate communication. For example, an attacker may include an attack in an email or Microsoft Word document, and when a user opens the email or document, the attack launches. |
Other application attacks | This attack category represents attacks that do not fit into the more explicit attack classifications. |
Abuse of functionality | Abuse of functionality is an attack technique that uses a website's own features and functionality to consume, defraud, or circumvent the applications access control mechanisms. |
Cross-site scripting (XSS) | Cross-site scripting (XSS) is an attack technique that forces a website to echo attacker-supplied executable code, which loads in a user's browser. |
Server-side code injection | SSI injection (server-side include) is a server-side exploit technique that allows an attacker to send code into a web application, which is then run locally by the web server. |
SQL injection | SQL Injection is an attack technique used to exploit websites that construct SQL statements from user-supplied input. |
Detection evasion | Detection evasion is an attack technique that attempts to disguise or hide an attack to avoid detection by an attack signature. |
Path traversal | The path traversal attack technique forces access to files, directories, and commands that potentially reside outside the web document root directory. |
LDAP injection | LDAP injection is an attack technique used to exploit web sites that construct LDAP statements from user-supplied input. |
Forceful Browsing | Forceful Browsing attacks attempt to access data outside the specific access schema of the application. |
HTTP parser attack | HTTP parser attacks attempt to execute malicious code, extract information, or enact Denial of Service by targeting the HTTP parser directly. |
HTTP Request Smuggling | HTTP Request Smuggling attacks attempt to encapsulate one request within another request through a web proxy. |
HTTP Response Splitting | HTTP Response Splitting attacks attempt to manipulating the server into inject a CR/LF sequence in its response headers. |
Injection Attempt | Injection Attempt attacks exploit weakness in various other applications in order to inject and/or execute malicious code. |
Malicious File Upload | Malicious File Upload attacks attempt to exploit services by uploading files that may contain malicious code. |
Non Browser Client | Non Browser Client attacks use crawlers or other scripts to simulate human activity. |
Other application activity | This attack category represents attacks that do not fit into the more explicit attack classifications. |
Parameter tampering | Parameter Tampering attacks attempt to manipulate and capture data by modifying parameters in HTTP query strings. |
Remote file include | Remote file location attacks attempt to exploit web applications that may retrieve and execute the code included in remote files. |
Server side code injection | Server side code injection attempts to exploit weakness in applications and services to force those services to execute malicous code. |
Session Hijacking | Session hijacking attacks attempt to hijack a valid extant user session. |
Web Scraping | Web scraping attacks simulate human exploration of the Web to harvest site information. |
XML Parser Attack | XML parser attacks attempt execute malicious code or enact a Denial of Service by targeting the XML parser directly. |
XPath Injection | XPath Injection is an attack technique used to exploit applications that construct XPath (XML Path Language) queries from user-supplied input to query or navigate XML documents. |
No comments