Académique Documents
Professionnel Documents
Culture Documents
An agent
component
Attack vector
What is a Threat Model
Depiction of:
The system’s attack surface
Threats who can attack the system
Assets threats may compromise
S Spoofing
Can an attacker gain access using a false identity?
T Tampering
Can an attacker modify data as it flows through the application?
R Repudiation
If an attacker denies doing something, can we prove he did it?
I Information disclosure
Can an attacker gain access to private or potentially injurious data?
D Denial of service
Can an attacker crash or reduce the availiability of the system?
E Elevation of privilege
Can an attacker assume the identity of a privileged user?
bWAPP (buggy Web Application)
Fields Description
Obtain Movies
information by
search query
AND
Information Disclosure Information Disclosure
http://localhost/bWAPP/bW
APP/sqli_1.php?title=1'
union select
1,2,3,4,version(),6,7-- -
Retrieving the Tables Name from the
bWAPP Database
‘and 1 = 0 union all select
1,table_schema,table_na
me,4,5,6,7 from
information_schema.table
s where 1=0 or 1=1-- '
Retrieving the Tables Name from the bWAPP
Database and Columns Name from Users table
Modifying the
Code in Web
application
AND
Tampering with data Tampering with data
Information Disclosure Information Disclosure
CHECK IF IT IS VULNERABLE
To test if the input field is
vulnerable, we try to inject this
script:
<script>alert('XSS')</script>
Summary