Web Application Security: Port Scanning, OSINT, and XSS Attacks
Added on 2024-06-03
14 Pages2465 Words94 Views
|
|
|
Web Application Security, Port Scanning and OSINT
1
1
![Web Application Security: Port Scanning, OSINT, and XSS Attacks_1](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fdocument%2Fpages%2F2024-06-03%2Fweb-application-security-port-scanning-osint-and-xss-attacks-page-1.webp&w=3840&q=10)
Contents
List of figures...................................................................................................................................2
NMAP..............................................................................................................................................3
OPEN PORT:...............................................................................................................................3
CLOSED PORT:..........................................................................................................................3
FILTERED PORT:......................................................................................................................4
OSINT..............................................................................................................................................8
Persistent & Non- Persistent Cross Site Scripting attack:...............................................................9
Persistent Cross Site Scripting attack...........................................................................................9
Non- Persistent Cross Site Scripting attack:..............................................................................10
Sensitive Data Exposure................................................................................................................12
OSWAP 10-2017 attacks:..........................................................................................................13
References......................................................................................................................................13
List of figures
Figure 1: OS detection.....................................................................................................................5
Figure 2: Track Information............................................................................................................7
Figure 3: Host service version number............................................................................................7
Figure 4: Persistent attack..............................................................................................................10
Figure 5: Reflected XSS attack......................................................................................................11
2
List of figures...................................................................................................................................2
NMAP..............................................................................................................................................3
OPEN PORT:...............................................................................................................................3
CLOSED PORT:..........................................................................................................................3
FILTERED PORT:......................................................................................................................4
OSINT..............................................................................................................................................8
Persistent & Non- Persistent Cross Site Scripting attack:...............................................................9
Persistent Cross Site Scripting attack...........................................................................................9
Non- Persistent Cross Site Scripting attack:..............................................................................10
Sensitive Data Exposure................................................................................................................12
OSWAP 10-2017 attacks:..........................................................................................................13
References......................................................................................................................................13
List of figures
Figure 1: OS detection.....................................................................................................................5
Figure 2: Track Information............................................................................................................7
Figure 3: Host service version number............................................................................................7
Figure 4: Persistent attack..............................................................................................................10
Figure 5: Reflected XSS attack......................................................................................................11
2
![Web Application Security: Port Scanning, OSINT, and XSS Attacks_2](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fdocument%2Fpages%2F2024-06-03%2Fweb-application-security-port-scanning-osint-and-xss-attacks-page-2.webp&w=3840&q=10)
NMAP
Nmap is a free security scanner which is used to determine the hosts & the services on the
computer network. We can see Nmap as building a ‘map’ on the computer network. To analyze
the response, crafted packets are sends to the hosts. Nmap is started for the Linux only, but now
it is ported to windows, Solaris and many other platforms. It can be adjusted to various network
conditions with latency & congestion during a scan and it continues to extend and improve the
tool periodically.
Following are the features of Nmap:
• Host discovery: host is discovered in the host discovery features.
• Port Scanning: Identifying the open ports on target has.
• OS detection: OS detection determine the operation system in addition with hardware
characteristics of the computing and network device.
• Version detection: It is used to discover the name of the application and the number of
the version (Lyon, 2009).
A)
OPEN PORT:
Open port is a port which accepts the TCP and UDP connections on this port. The primary goal
of scanning is to find the type of connection. The person who find the connection knows about
the possibility of attack. The open port are closed & protect by the administrators from the
firewalls. These ports are also doing non- security scanning to know about the available services
on the specified network.
CLOSED PORT:
Closed port cannot be listening but it can be accessible. This port shows that on a specified IP
address the host is up. The scanning is worthy in the closed port which might be realized later.
Such port can be blocked by using firewalls by administrator.
3
Nmap is a free security scanner which is used to determine the hosts & the services on the
computer network. We can see Nmap as building a ‘map’ on the computer network. To analyze
the response, crafted packets are sends to the hosts. Nmap is started for the Linux only, but now
it is ported to windows, Solaris and many other platforms. It can be adjusted to various network
conditions with latency & congestion during a scan and it continues to extend and improve the
tool periodically.
Following are the features of Nmap:
• Host discovery: host is discovered in the host discovery features.
• Port Scanning: Identifying the open ports on target has.
• OS detection: OS detection determine the operation system in addition with hardware
characteristics of the computing and network device.
• Version detection: It is used to discover the name of the application and the number of
the version (Lyon, 2009).
A)
OPEN PORT:
Open port is a port which accepts the TCP and UDP connections on this port. The primary goal
of scanning is to find the type of connection. The person who find the connection knows about
the possibility of attack. The open port are closed & protect by the administrators from the
firewalls. These ports are also doing non- security scanning to know about the available services
on the specified network.
CLOSED PORT:
Closed port cannot be listening but it can be accessible. This port shows that on a specified IP
address the host is up. The scanning is worthy in the closed port which might be realized later.
Such port can be blocked by using firewalls by administrator.
3
![Web Application Security: Port Scanning, OSINT, and XSS Attacks_3](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fdocument%2Fpages%2F2024-06-03%2Fweb-application-security-port-scanning-osint-and-xss-attacks-page-3.webp&w=3840&q=10)
FILTERED PORT:
Sometimes, Nmap is not available to determine whether the port is open or not because the
filtering of packets prevents it from reaching ports. These ports are considered as the firewall or
host based firewalls. These are useful when attacker wants to attack by providing little
information.
The scan is probably slow by forcing the Nmap to do the scan several times in the case of
network congestion..
B)
Command for identifying the OS:
-O is used to detect the operating system. –A can also be used to detect the Operating System in
addition with other things.
Syntax: nmap –O –v oversiondetect.txt 192.168.2.100
4
Sometimes, Nmap is not available to determine whether the port is open or not because the
filtering of packets prevents it from reaching ports. These ports are considered as the firewall or
host based firewalls. These are useful when attacker wants to attack by providing little
information.
The scan is probably slow by forcing the Nmap to do the scan several times in the case of
network congestion..
B)
Command for identifying the OS:
-O is used to detect the operating system. –A can also be used to detect the Operating System in
addition with other things.
Syntax: nmap –O –v oversiondetect.txt 192.168.2.100
4
![Web Application Security: Port Scanning, OSINT, and XSS Attacks_4](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fdocument%2Fpages%2F2024-06-03%2Fweb-application-security-port-scanning-osint-and-xss-attacks-page-4.webp&w=3840&q=10)
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Firewall and Configuration Report 2022lg...
|22
|1741
|23
Overview of Network Securitylg...
|11
|1474
|434
Network Security Tools: Nmap and Metasploitlg...
|9
|1824
|206
Analysis of Network Security Tools: Nessus and Nmaplg...
|17
|1294
|337
Nmap and Metasploit: A Comprehensive Analysis of Security Toolslg...
|20
|2496
|156
Network Vulnerability And Cyber Securitylg...
|15
|1453
|15