Application Hacking PPT-1
Application Hacking PPT-1
Applications Hacking
❑ Introduction
❑ Messaging System
❑ Web Application Hacking
❑ Database System Vulnerabilities.
❑ Conclusion
❑ Reference
Introduction
Email Attack
Attachment Overloading
Connection Attack Autoresponder Attack
Attack
Banners Attack
❑ Banner grabbing is a technique used by hackers and security teams to gain
information about a computer system on a network and services running on its
open ports.
❑ Tools like Nmap, Netcat, and Telnet perform banner grabbing
Email Bombs
❑ The sending of huge volumes of emails to one address in an attempt to
overwhelm the system and shut it down.
❑ Email bombs are a type of Denial of Service (DoS) attack.
❑ Different email bomb attacks are as attachments overloading attack, connection
attack, autoresponder attack.
Attachment Overloading Attack
❑ Countermeasures:
• Make it policy that no one sets up an autoresponder message.
• Prevent e-mail attack as far considering perimeter of your
network.
Practices for minimizing email security risk.
❑ Directory traversal an HTTP attack which allows attackers to access restricted directories and
execute commands outside of the web server’s root directory.
❑ Two main levels of security mechanisms.
▪ Access Control Lists(ACLs)
▪ Root Directory
❑ Countermeasures:
▪ Don’t store old, sensitive ot otherwise non public files on your Web server
▪ Ensure that your Web server is properly configured to allow public access only to
those directories that are needed for the site to the function.
Database System
✓ Database backups
✓ Poor encryption
✓ Data Breaches
✓ Denial-of-Service attack
✓ SQL Injection
✓ Data exposure
Best security practices for minimizing
the database security risks
❑ Websites:
▪ https://backendless.com/database-security-best-practices/
▪ www.datasunrise.com
▪ www.zednet.com
❑ Books:
▪ Hacking for Dummies By Wiley Brand
Thank You!