Hello, everyone, Welcome back to the course. He didn't find me, but thanks to logs, I mean go Vieira hitting the last video we talked about organizes and its challenges.
The last video We finished our views in previous module. We talked about important things related to have application in Logan and Aziz. This module will be more hints on. We will perform somewhere Application attacks and Jodl organizes.
To start, we'll talk about Web application attacks.
Based on this, the Lord objective off this video are understands the difference between infrastructure and application attacks
each earned those. They're always stopped in project
reviews, some common Web application attacks
and understand that you are all components. That's begging.
First, let's remember some Web application components.
I don't remember when we talked about J C, P I. P. And it had to be
that http uses recipe I picked to communicate
to Web application works. It needs a lot off components.
Let's check some of them
in the top layer. We have the Web application
GHB, and it'd be are related to this layer
after something that we talked about the Web seven that holds the application
Web. Seven Softeners like Apache and Jags are in this layer. This two components needs to run in some place. This place is a server wave operational system
life. Microsoft's Windows are only nerds.
This is US Tru TV War machines.
We can add to this earlier the database service and application service.
And the less layer we have the network hardware in service is that make their communications possible.
This is only one way to understand the Web application and its components. It is important to know that each components can be attacked.
And since one publication depends on all these components on attack on each away can affect the Web application to so other three layers under their Web application. Our infrastructure In this course we'll focus on the top layer. The Web application attacks.
This is a cheap going for a stroke to to support our publication.
Another design. It's possible,
but will not be so different from this. Jax is over. Page the user. You send a request to the Web server and they were observant. You access your other components.
This means that all this infrastructure can help with logs, so if you have more logs, you have more information. During your investigation,
you have the same Web application in the same infrastructure. How do you think that you can identify a malicious user and an attack?
You did fine attack. You need to know about the attack and the website. The logs will help you need fighters in time.
As we said before, the Web applications are trying servant oriented.
Basing this model, we can cross fire replication attacks in two types,
that usually explores a vulnerability. Yours is in point.
Where is located the Web client. The second classifications is seven side the tights.
In this case, the target is the server.
In this car's. We'll focus on service side attacks. Since the website is a target became usage logs identify the attack
to talk about in tax. We need to talk about vulnerabilities,
one off definitions off. Pulling our beauty.
which says that vulnerability is a weakness in information. Sister station security procedures in a row controls our implementation that could be exploited or triggered by a thread source to us. Will you change information season for Web application?
The attacker is someone who tries to exploit the vulnerability and all the fun everything's is the dark. So face here. Some more definitions risk the possibility off something that happened
garbage to us. Web service and Web applications
and the attack are basically any action that someone is performing, trying to export of inability or not to cause any impact on the Web application.
We are talking about the text, but do you know what are the most common Web application attacks?
To answer this question, we will use our definitions on the lessons lights
based on the definitions. We need a vulnerability. You have an attack,
so it's better to ask what are the most come over the abilities.
To answer this question, we have their own last stopped in Project
WASP, which means open Web applications. Security Project is a project that catalogs to talk to influence ability on the Web applications.
In this course, we use diversion. Launch it in 2017
in the first version is from 2003
gentle WASP website. If you want more information
here, we have the cooperation between 2013 and 2017 project.
In this course, we use examples off some attacks like injection broken education, security, Miss Configuration Cross site scripting
using components with vulnerabilities
And the less talk is not an attack but is related to our course
to talk about Web attacks. We need to understand that you are a Rh components.
You are el is Uniform resource located.
It is a type off universal resource in the fire
User agents use that you are here to request information from the Web server.
Each Web application Have one resource locator and this make possible tribes ever host Main applications
You are is also know as Web address
and has multiple parts.
Let's understand its components
scheme that identifies the protocol. Oh, host of the me that could be followed or not by apart
Bath that identifies the resource already want to access.
And the query. They're used to pass some information.
It received a cyber logging page. We can find the components
this game. A protocol in this case is a GPS.
Www dot cyber. Dora Qi is the host. Order me. You can see here that we do not have the part information.
It will use the four for three because of https scheme.
After the flash is the past and after the question mark is the query.
It is important to know that the most off the attacks are performing in the past are in the choir components. If you want to know more about, check this to websites.
I'm not important. V is encoding.
You are ask. You won't be sent over network using asking, Carter said.
To respect this rule, some off the Curtis need to be included in our ski
the including works changing then supported character for 1% followed by two numbers. The two numbers are the Exodus mortgages off the encoded character,
for example, they space is covered 2% 20. Like this example,
another use is to convert different right seasons
that doesn't use leading chars like Iraq or Chinese
House, including is used to perform attacks,
although a percent in their requests doesn't mean that this is a malicious request. Percent is used to go in bad actions.
For example, the cyber request has percent, but it's safe
to make things clear. Let's see this request.
We have this big requests here with men percent.
If you know about Ehskyoo, you can ask notice some Eskimo words like select where in others could you find this words?
It's hard to find right.
There are many percents
to help. We can decode it. There are many sides that can help with the Cody.
After the D call, we'll be able to find what it really means.
Now. It's easy to see their scare words in the really quest letting this course we'll learn that this requires is asking of injection attack.
A cheap car using you do many requests. Tracks. It's one page. This means that they use it. We request different paths. Enquiries
here. An example. Often user request one website.
One knocks is generated three lines off logs. Other requests are from same I p address. Same there in time. But oh are different requests.
It is a common behavior in the Martin Web pages.
Many requests to load a single Web page.
No, you know of application will help you to identify this behavior.
Post assessment question.
Considering a baseball before structure on the Web server are susceptible to attacks,
this is information to our force.
Doesn't formations force? Remember, that Web application depends on many components, and off them can be targets.
Which of these vulnerabilities are present. You know what stopped in Project 2017? The answer is injection and secure Miss Configuration.
The other options are related infrastructure attacks
and for the last question,
check this off formation
Web request with a percent sign on AIDS are malicious.
This information is true or force
this often missions force
percent is not always my leashes.
It can be used to transfer a different word season or supported characters.
In this lesson, we talked about difference between Web application and infrastructure attacks based in a layer approach.
The definition off, an attack and vulnerability
they owe us stopped in project
and the reviews you are air components at decoding
either Next video way start all organizes,
starting with different abilities skins.