This article looks at five common Web application attacks, primarily for PHP applications, and then presents a case study of a vulnerable Website that was found through Google and easily exploited. Each of the attacks we'll cover are part of a wide field of study, and readers are advised to follow the references listed in each section for further reading.
It is important for Web developers and administrators to have a thorough knowledge of these attacks. It should also be noted that that Web applications can be subjected to many more attacks than just those listed here.
The list they share contains all of the usual suspects:
- remote code execution
- SQL injection
- format string vulnerabilities (unfiltered user input)
- cross-site scripting (XSS)
- username enumeration
For each, they give a definition of what it is and how it's done, a rating on how critical it is, some of the previously vulnerable products, some code examples of how it might work, and some countermeasures/reference material for more information.