This report encompasses data gathered by the SpiderLabs Team during 220 forensic investigations and over 2,300 manual penetration tests. Notice the word "manual" was highlighted right? That means that this data was not gathered through the use of automated scanning tools but rather by manually testing target networks and applications. This means that we are able to dig in deeper into the target web application and uncover vulnerabilities that automated tools alone would never identify. While there is a ton of great data within the GSR 2011 report, for this blog post, I wanted to focus a bit of attention to the web application sections of the report.
Top 10 Web Application Risks
This Top 10 list was gathered by the Trustwave SpiderLabs Application Pentest Team. The attacks and vulnerabilities listed below are ranked by collective threat, based on the frequency of findings, difficulty in launching the attack and the potential impact when exploited by criminals. The report explains:
For example, while SQL injection is not the most common vulnerability we encounter, the potential for the bulk extraction of sensitive data makes it the number one threat of 2010. Conversely, cross-site request forgery (CSRF) is one of the most common application vulnerabilities, but requires a more complicated attack scheme, relegating it to eighth on the list.
Here is the Top 10 List:
SQL Injection
Logic Flaw
Authorization Bypass
Cross-site Scripting (XSS)
Authentication Bypass
Vulnerable Third Party Software
Session Handling Flaw
Cross-site Request Forgery (CSRF)
Verbose Errors
Source Code Disclosure
Download: https://www.trustwave.com
Volut-ID | World News Articles
All news of interest and can provide an info for you, and so can assist in the search for new news.
About news gadgets, mobile phones
info about the latest mobile phone, from news, features, and the most mobile phone models in search of the world.
Trustwave's Global Security Report 2011: Web Application Risks
Related Post
Papers
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- 2011 Data Breach Investigations Report
- 2011 Data Breach Investigations Report
- Mozilla Firefox Internals & Attack Strategies
- Mozilla Firefox Internals & Attack Strategies
- Web application vulnerabilities in context of browser extensions
- Web application vulnerabilities in context of browser extensions
- PHP LFI to arbitratry code execution via rfc1867 file upload temporary files
- PHP LFI to arbitratry code execution via rfc1867 file upload temporary files
- Credit Card skimming and PIN harvesting in an EMV world
- Credit Card skimming and PIN harvesting in an EMV world
- Exposing the Lack of Privacy in File Hosting Services
- Exposing the Lack of Privacy in File Hosting Services
- Botnets: Measurement, Detection, Disinfection and Defence
- Botnets: Measurement, Detection, Disinfection and Defence
- Leaking browsing history via user interaction and side channel attacks
- Leaking browsing history via user interaction and side channel attacks
- HTTP Geolocation
- HTTP Geolocation
- HITB Magazine Issue 005 released
- HITB Magazine Issue 005 released
- Symantec Report on Attack Kits and Malicious Websites
- Symantec Report on Attack Kits and Malicious Websites
- Trustwave's Global Security Report 2011: Web Application Risks
SQL Injection
- Safe3 Sql Injector v.8.1 released
- Fastest Online SQL Injection Dumper
- Fastest Online SQL Injection Dumper
- Barracuda Networks website Hacked
- Barracuda Networks website Hacked
- MySql.Com hacked
- MySql.Com hacked
- aidSQL SQL Injection Detection And Exploitation Tool
- aidSQL SQL Injection Detection And Exploitation Tool
- Trustwave's Global Security Report 2011: Web Application Risks
- SQL Smuggling
- SQL Smuggling
- SqlInjector v1.0.2 released
- SqlInjector v1.0.2 released
- Blind Cat - Blind SQL Injection Exploitation tool
- Blind Cat - Blind SQL Injection Exploitation tool
- SQL Injection Attacks Return
- SQL Injection Attacks Return
- Hexjector v1.0.7.3 Special Edition
- Hexjector v1.0.7.3 Special Edition
- ExploitMyUnion v2.1
- ExploitMyUnion v2.1
- Safe3 SQL Injector
- Safe3 SQL Injector
security
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- PacketFence v.2.2 Released
- PacketFence v.2.2 Released
- Updates: ZoomIt v4.2, Process Explorer v14.11, ProcDump v3.04, and Mark Live: Zero Day Malware Cleaning with the Sysinternals Tools
- Updates: ZoomIt v4.2, Process Explorer v14.11, ProcDump v3.04, and Mark Live: Zero Day Malware Cleaning with the Sysinternals Tools
- AntiXSS v.4.0 Released
- AntiXSS v.4.0 Released
- ESET NOD32 Antivirus comes to Linux
- Nmap, scans your computer ports
- YARA v.1.5 released
- YARA v.1.5 released
- Preventing XSS Attacks
- Preventing XSS Attacks
- Credit Card skimming and PIN harvesting in an EMV world
- Credit Card skimming and PIN harvesting in an EMV world
- Book - Configuring IPCop Firewalls
- Tip: Solution to Bug in Flash on YouTube
- How To install ESET NOD32 Antivirus 4 for Linux
- OWASP AntiSamy v.1.4.4 Released
- OWASP AntiSamy v.1.4.4 Released
- About 40 security problems discovered in the kernel of Ubuntu 10.04 LTS
- Comitari : Web Protection Suite
- Comitari : Web Protection Suite
- The Open Source Pentest Bookmarks Collection
Labels:
Papers,
security,
SQL Injection
No response to “Trustwave's Global Security Report 2011: Web Application Risks”
Leave a reply