{"title":"A Review of Common Web Application Breaching Techniques (SQLi, XSS, CSRF)","authors":"Chee Sam Cheah, Vinesha Selvarajah","doi":"10.2991/ahis.k.210913.068","DOIUrl":null,"url":null,"abstract":"Regarded as one of the most popular platforms for digital services and content delivery over the internet, web application has been transforming our society for the better. However, with an increasing amount of critical services built upon web applications across government and private sectors, web applications have become a clear target for adversaries driven by financial or political motives. Although security standards such as the OWASP ASVS are being actively developed by security researchers to counteract the attacks on web applications, the concept of secure coding remains hostile for many developers, resulting in developed systems with various underlying vulnerabilities. This paper aims to provide an overview of the most common web application breaching techniques, with explanations to their working principles, proof of concept examples as well as applicable countermeasures.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"16 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2991/ahis.k.210913.068","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Regarded as one of the most popular platforms for digital services and content delivery over the internet, web application has been transforming our society for the better. However, with an increasing amount of critical services built upon web applications across government and private sectors, web applications have become a clear target for adversaries driven by financial or political motives. Although security standards such as the OWASP ASVS are being actively developed by security researchers to counteract the attacks on web applications, the concept of secure coding remains hostile for many developers, resulting in developed systems with various underlying vulnerabilities. This paper aims to provide an overview of the most common web application breaching techniques, with explanations to their working principles, proof of concept examples as well as applicable countermeasures.