View WEB application protection from common hacker attack methods

Source: Internet
Author: User

Currently, Web technology is widely used by customers and servers. As a result, hackers are increasingly attacking Web application cities by using various attack methods, that is, they bypass conventional protection methods such as firewalls, it also makes the attack methods easier and more diversified, making it difficult to prevent.

There is a reason why hackers generally use Web Attacks:

1. Server Vulnerabilities

Due to vulnerabilities and Server Management Configuration errors, Internet Information Server (IIS) and Apache network servers are often attacked by hackers.

2. Web server virtual hosting

At the same time, servers hosting several or even thousands of websites are also targets of malicious attacks.

3. Explicit/open proxy

Computers controlled by hackers can be set as proxy servers to bypass URL filtering for communication control, perform anonymous Internet access or act as middlemen for illegal website data streams.

4. HTML can embed objects from completely different servers on the webpage.

Users can access the web page from a specific website, and automatically download objects from legitimate websites such as Google analysis servers; AD servers; malware download websites; or redirect users to malware websites.

5. The common client may be a hacker's test source.

Internet Explorer, Firefox, and other browsing areas and Windows operating systems contain many vulnerabilities that can be exploited by hackers, especially when users do not install patches in a timely manner. Hackers can exploit these vulnerabilities to automatically download malware code without the user's consent-also known as hidden download. Therefore, they may often become controlled by hackers, which brings risks to your Web applications while accessing your website.

6. Various mobile codes and cross-site scripts are widely used on websites.

Disable JavaScript, Java applets, and ,. NET Applications, Flash, or ActiveX seem to be a good idea, because they all automatically execute scripts or code on your computer, but if these features are disabled, many websites may not be able to browse. This opens the door for poorly-coded Web applications that accept user input and use Cookies, just as in cross-site scripting (XSS. In this case, some data (Cookies) Web applications that need to access other open pages may be messy. Any Web application that accepts user input (blog, Wikis, and comments) may accidentally accept malicious code, which can be returned to other users, unless your input is checked for malicious code.

7. General access to HTTP and HTTPS

To access the Internet, you must use the Web. All computers can access HTTP and HTTPS through the firewall (TCP ports 80 and 443 ). It can be assumed that all computers can access the external network. Many programs access the Internet through HTTP, such as IM and P2P software. In addition, these hijacked software opened the channel for sending botnet commands.

8. embedded HTML is used in emails.

Because the SMTP Email Gateway restricts email sending to some extent, hackers do not often send malicious code in emails. On the contrary, the HTML in the email is used to obtain malware code from the Web, and the user may not know that a request has been sent to a website.

We can see from the common attack directions of the above hackers that, in order to avoid making us the target of these hackers, we need a device dedicated to comprehensive protection against Web applications, deploy a three-dimensional protection layer to automatically and intelligently identify and defend against these attacks. Instead of using one or more traditional passive protection gateways with fixed policies or fixed attack feature libraries.

The emergence of the WEB application firewall is dedicated to solving this problem. The application firewall processes the application layer by executing requests within the application session, it protects Web application communication streams and all related application resources from attacks by exploiting Web protocols or application vulnerabilities. The application firewall can block browser and HTTP attacks that use application behavior for malicious purposes. Some powerful application firewalls can even simulate a proxy as a website server to accept application delivery, the image is equivalent to adding a safe insulation housing to the original website.

We use the Barracuda-NC application firewall, which is widely used in the industry. It can effectively defend against Web application layer attacks that cannot be detected by the following general methods:

Implant malicious scripts

Cookie/Session poisoning

Form/hide field Modification

Cache Overflow

Parameter tampering

Cross-Site Scripting

Forced browsing/directory Detection

SQL Injection/Command Injection

Data theft/identity theft

Known vulnerability attacks/Zero Day Vulnerability attacks

Application Dos

During work, Barracuda-NC application firewall has the advantages of application-layer detection and state-based network firewall,

· Complete application data entry check, HTTP header rewriting, and forced HTTP protocol compliance to prevent various attacks and permissions exploiting protocol vulnerabilities;

· Complete Knowledge of expected data (Complete Knowledge of expected values) system to prevent various forms of SQL/Command Injection and cross-site scripting attacks;

· Real-time policy generation and execution: Define corresponding protection policies based on your applications, instead of predefined defense policies by the same manufacturer, and seamlessly build your applications, will not cause any application distortion.

 

In addition, it can make your Web application fully invisible, because even if hackers are magical, they cannot attack invisible things. Barracuda-NC application firewall protects external websites, you can hide the real Web server type, application server type, operating system, version number, version update level, known security vulnerabilities, real IP addresses, and internal workstation information to make it invisible and invisible to hackers, if it cannot be detected, there is naturally no way to guess analysis and attack. The following is the result of a common scanning tool scanning websites hidden by the Barracuda-NC application firewall.

 

At the same time, it can also identify various crawling probe programs and only allow normal search engine crawlers to access them. It can defend against hacker crawling programs outside the door, so that hackers who want to determine the target of the attack can be completely unlocked.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.