Application: Perform a Website and Database Attack
Because web servers are not located behind firewalls and often have databases on their back-ends, they are prime targets for hackers. One popular attack against a web server is a cross-site scripting (XSS) attack, which uses a compromised server to trick users into providing sensitive information. Remember the online banking scenario from an earlier unit? It could have been implemented as an XSS attack.
Databases also can be attacked through a client’s front-end. One popular method for doing so is an SQL injection attack. With this method, attackers enter SQL queries into input fields. If the input fields are not properly validated, this “input” is then sent to the database as part of the query. Attackers, if permitted, can use this method to view sensitive information, manipulate data, shut down the database, or any other operation allowed by SQL. If successful, an attacker “owns” your database.
Any flaws in a web server’s configu