Imperva analyse trending hacking techniques and interesting attacks

Imperva analyse trending hacking techniques and interesting attacks

ID: 29848

(PresseBox) - 11 - Imperva's Hacker Intelligence Initiative has turned the tables on the hacking community by delving into their cyber-underground lair to provide analysis of the trending hacking techniques and interesting attack campaigns from the past month. The first, of what will be a monthly inside scope, looks at an attack which usually flies under the radar - Remote File Inclusion (RFI).
Amichai Shulman, Imperva's co founder and CTO, believes, "Although these attacks have the potential to cause as much damage as the more popular SQL Injection and Cross-Site Scripting (XSS) attacks, they are not widely discussed and they need to be!"
Speaking about the attack format itself, Amichai explains, "Remote File Inclusion (RFI) is an attack that targets the computer servers that run web sites and their applications. RFI usually exploits the PHP programming language - used by many large firms including Facebook and SugarCRM. RFI works by exploiting applications that reference files hosted on different servers and, as PHP doesn't properly sanitize the input to these requests, an RFI attack replaces these references with links to websites that are under the attacker's control and can be used for temporary data theft or manipulation, or for a long term takeover of the vulnerable server."
Amichai provides the following advice, "The most common protection mechanism against RFI attacks is based on signatures for known vulnerabilities in the Web application. From our observations, it is apparent that can we can improve the detection and blocking of such attacks by creating a blacklist of attack sources and a black list of URLs of remotely included malicious scripts. By having advanced knowledge of RFI attack sources allows the WAF to block an attack before it even begins. By creating a blacklist of the referenced URL enables the WAF to block exploits targeting zero-day vulnerabilities of applications. Finally, the blacklist of IPs constructed from the RFI attack observations could be used to block other types of attacks issued from the same malicious sources."




HII has documented examples of automated attack campaigns launched in the wild. This report pinpoints their common traits and techniques, as well as the role blacklisting can play in mitigating them and can be viewed by visiting : blog.imperva.com.

Unternehmensinformation / Kurzprofil:
drucken  als PDF  an Freund senden  GPU -Cluster JUDGE- Facebook Applications Accidentally Leaking Access to Third Parties
Bereitgestellt von Benutzer: PresseBox
Datum: 11.05.2011 - 11:14 Uhr
Sprache: Deutsch
News-ID 29848
Anzahl Zeichen: 0

contact information:
Town:

Redwood Shores



Kategorie:

Hazadous Materials Management



Diese Pressemitteilung wurde bisher 260 mal aufgerufen.


Die Pressemitteilung mit dem Titel:
"Imperva analyse trending hacking techniques and interesting attacks"
steht unter der journalistisch-redaktionellen Verantwortung von

Imperva Inc. (Nachricht senden)

Beachten Sie bitte die weiteren Informationen zum Haftungsauschluß (gemäß TMG - TeleMedianGesetz) und dem Datenschutz (gemäß der DSGVO).

Imperva Report Details Automated Web Application Attacks ...

12 - Imperva, Inc. (NYSE: IMPV), a pioneer and leader of a new category of data security solutions for high-value business data in the data center, today released its April Hacker Intelligence Report Automation of Attacks, which analyzes how and why ...

Alle Meldungen von Imperva Inc.



 

Werbung



Facebook

Sponsoren

foodir.org The food directory für Deutschland
News zu Snacks finden Sie auf Snackeo.
Informationen für Feinsnacker finden Sie hier.

Firmenverzeichniss

Firmen die firmenpresse für ihre Pressearbeit erfolgreich nutzen
1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z