I S O D E V E L O P

//Don't Blink//

How Hackers Attack
Your Digital Space.

Creating a website is a great marketing tool and accomplishment. However, you must fend off attacks on a daily basis. Received SPAM email before? Yes most likely from automated scripts so although you are quite annoyed, there's not really a human that cares since its done by robots or computer programs. However, when the hacker has malicious intent, it makes it more imperative that you guard against attacks that can compromise your entire system. Learn more below about attacks we definitely guard against.

In this attack, the hacker is able to compromise your system because output has not been escaped. This is mostly seen when a script can be run from a webpage unknowingly because the user generated input was not escaped when it was output.

With this type of attack, a hacker is trying to get access to the most important part of your business, the data. If this attack is successful, then the hacker may require a ransom to not expose the information of your high value clients.

Authentication attacks happen when most likely a computer can try many combinations for the password. Hackers pay attention to your errror messages. For example, let's assume your error is this account does not exist in our system. Then the hacker knows to keep moving. When there is a hit on an account that does exist in the system but has the incorrect password, then thhe error message can suggest to the hacker to halt at this email or username and try a bunch of different passwords, usually automated until the password of the user is cracked. Having a limit on the number of incorrect passwords over a time period can help with this type of attack.

In this type of attack, a hacker is trying to gain access to valuable information without payment. For example, the hacker may request a free account to see what the backend system looks like. From there, the hacker can look around to see if anything is vulnerable. In addition, they may be able to find the location of a valuable file on your system. Through either payment or somehow, getting the information from a valid user that pays for the service. They can then authenticate their free account and try to access this information directly. If your system does not prevent against this then your hacker will have just received free content.

If your system trusts user input and doesn't verify the information submitted on the backend, then it might be possible for a hacker to change the price of a service and in essence get it for free. For example, if the price were changed to 5 cents and your system doesn't realize it, then that's all they'd have to pay for whatever service.

Black hat hackers that compromise your data and require a ransom to save embarasssment. If a ransomware hacker successfully compromises your digital space, it can be a complete nightmare.

Websites that act like real sites but only appear (look that way) to be the real site. The website address is not from the real site, but as you enter information into the mimic website, it posts the information you enter to the real site, while recording what you entered for use later. Hence, it is possible you never know you were at a phishing site while they still have the data that compromises you or your account.

This attack usually requires some sort of internal knowledge of how a system works. For example, a fired employee or something to that effect. In this type of attack, there's a bad actor in the middle that intercepts the traffic from the intended guests and forwards it as if nothing happened. So for example, let's say we make a request by entering a web address we want to see. The man in the middle gets the address destination information to know where to send it. The data is compromised and afterwards, the machine sends it to the correct destination address. Hence the user never knew they were attacked because everything seems to be working properly.

Couldn’t find your answer? Ask a Question