A Review of Common Web Application Breaching Techniques (SQLi, XSS, CSRF)
- https://doi.org/10.2991/ahis.k.210913.068How to use a DOI?
- Web Application Security, SQL Injection, Cross-Site Scripting, Cross-Site Request Forgery
Regarded as one of the most popular platforms for digital services and content delivery over the internet, web application has been transforming our society for the better. However, with an increasing amount of critical services built upon web applications across government and private sectors, web applications have become a clear target for adversaries driven by financial or political motives. Although security standards such as the OWASP ASVS are being actively developed by security researchers to counteract the attacks on web applications, the concept of secure coding remains hostile for many developers, resulting in developed systems with various underlying vulnerabilities. This paper aims to provide an overview of the most common web application breaching techniques, with explanations to their working principles, proof of concept examples as well as applicable countermeasures.
- © 2021, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Chee Sam Cheah AU - Vinesha Selvarajah PY - 2021 DA - 2021/09/13 TI - A Review of Common Web Application Breaching Techniques (SQLi, XSS, CSRF) BT - Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021) PB - Atlantis Press SP - 540 EP - 547 SN - 2589-4900 UR - https://doi.org/10.2991/ahis.k.210913.068 DO - https://doi.org/10.2991/ahis.k.210913.068 ID - Cheah2021 ER -