The Web Hacking Incident Database (WHID) is a project dedicated to maintaining a record of web application-related security incidents. WHID’s purpose is to serve as a tool for raising awareness of web application security problems and to provide information for statistical analysis of web application security incidents. Unlike other resources covering web site security – which focus on the technical aspect of the incident – the WHID focuses on the impact of the attack. SpiderLabs is a WHID project contributor.
An analysis of the Web hacking incidents from the first half of 2010 performed by Trustwave’s SpiderLabs Security Research team shows the following trends and findings:
WHID Top 10 Risks for 2010
As part of the WHID analysis, here is a current Top 10 listing of the application weaknesses that are actively being exploited (with example attack method mapping in parentheses). Hopefully this data can be used by organizations to re-prioritize their remediation efforts.
WHID Top 10 for 2010
1
Improper Output Handling (XSS and Planting of Malware)
2
Insufficient Anti-Automation (Brute Force and DoS)
3
Improper Input Handling (SQL Injection)
4
Insufficient Authentication (Stolen Credentials/Banking Trojans)
5
Application Misconfiguration (Detailed error messages)
6
Insufficient Process Validation (CSRF and DNS Hijacking)
7
Insufficient Authorization (Predictable Resource Location/Forceful Browsing)
8
Abuse of Functionality (CSRF/Click-Fraud)
9
Insufficient Password Recovery (Brute Force)
10
Improper Filesystem Permissions (info Leakages)
Download the full report (local copy - no registration).
Join the live Trustwave Webinar: Web Hacking Incidents Revealed: Trends, Stats and How to Defend (registration required).
Insert links to other pages or uploaded files.
Tip: To turn text into a link, highlight the text, then click on a page or file from the list above.
Comments (0)
You don't have permission to comment on this page.