Discussing this chapter is the most common attack we know. Hackers use the Web's weaknesses, these few or hardly get control. The most common Web service weakness is not only in Microsoft Internet Information Server (IIS), but also there is a web service, Apache, and other web services with Sun ONE JAVA.
Hackers will study things in most commonly used Web services, want to find remote available vulnerabilities to get root or fully login privileges. The reason is because, when you find a remote available bug, you can make hackers can use malicious code on hosts that are not tens of thousands of machines.
The evolution of the web application
In today's Internet environment, it is a mixture of different technologies, protocols and operating systems dispersed in global. By using this mixer, this may cause the application to communicate with each other.
Web applications have an unusual potential for users and developers, but they can also become a nightmare for security and system management, most of the web services encodes a certain existing security executive, and supports some applications as a structure. Also not independently and its own platform. Most offers and other developers write code to configure and apply Web services. This is why so many vulnerabilities can be found in these codes, which makes customers and system users under attack.
Most web applications are continuous with more functionality and allocation of more scaling features, which adds a lot of potential vulnerabilities in the code. The company expects to use the formation technology to achieve competitive advantages, but they should be able to have a security expert to view these code before the product is sold to the public. This will help to avoid the possibility of hackers to find remote or local vulnerability bugs in applications. Most web attacks are at the application of the app. Hackers don't need extensive knowledge to get logging in to local networks or a separate system
Table See 1-1; this is a small typical Web application technology total
Table 1-1 web application technologies Table 1-1 Web Application Technologies Software Technology Vendor TechnologiesSun Microsystems Java 2 Enterprise EditionBEA WeblogicIBM WebsphereMicrosoft javascript, ASP.NET, ISAPI, Common Object Model (COM), Active Server Pages (JSP) Apache Jakarta ( Server-Site Java) and phpGeneric HTML, Perl and CGI
Evolution of Web Development
With the development of web applications, Web development has also been long-term development. From a very basic directory table to remotely available buffer overflow, many companies work hard to find the security code they can do, but hackers are also Constantly looking for new, more complex methods to find bugs and use their way
Malicious object: Java / ActiveX Objects
Java and JavaScript
Java Objects or Applets is a small app written on the Sun micro system, and Java is an object-oriented language. It can treat all the elements as object processing, Java encoding, and wind in a file called .class, this file is stored in the web server, when in another language web client, its code will not be Give way. Java is one of the most advantageous INTERNET development tools today. Java provides developers with portable code, developers' development can be executed via Web.
In addition, hacker is targeting a way to use JavaScript, JavaScript is a scripting language, which can be applied in many server segments and client applications.
JavaScript is mainly used to accept user input and bundle other components together. The most important web browser built an JavaScript engine, which can accept these unformatted JavaScript text code and translate burst in the customer segment. Below is a very basic JavaScript example, it shows the Popup BoxExample: JavaScript popup box when a button is clicked
1 2
3