Get started

By signing up, you agree to our Terms of Use and Privacy Policy.
Reset your password
Enter your email and we'll send you instructions on how to reset your password.

Web Services Attacks

The vulnerabilities in the web service protocols like SOAP, WSDL, UDDI can be exploited to do various kinds of attacks like SQL injection, XML poisoning, etc.

File Uploads:

This attack happens wherein a user is able to upload all types of file extensions even though the upload is intended only for few extensions. This is due to improper validation against the type of files getting uploaded, an attacker will be able to upload malicious files.

DNS Hijacking/Poisoning:

If an attacker is able to get access to the DNS files, he can modify the contents of the DNS records so that he can redirect the victim to a malicious web page, though they are requesting for a legitimate web page. DNS Server does the domain to IP resolving; so when a DNS poisoning is executed to modify the IP corresponding to a domain to some other IP, the attacker can trick the victim into browsing the pages he intended them to instead of the original ones.

Poisoning can be done at cache/DNS server, or an attack can modify the IP on the fly by intercepting the traffic too.

DNS Cache Poisoning
Image Source: https://commons.wikimedia.org/wiki/File:Dns-cache-poisoning.png

 

DNS Spoofing
Image Source: https://www.keycdn.com/support/dns-spoofing/


0 Comments

Add Comment

Subject to Moderate