
How many Attack Type in F5 ASM -
We can discuss how many types of attacks in F5 ASM -
Attack Type
Explanation
Buffer overflow
Buffer overflow exploits are attacks that alter the flow on an application by overwriting parts of memory.
Directory indexing
Automatic directory listing/indexing is a web server function that lists all of the files within a requested directory if the normal base file is not present.
Authentication/authorization attacks
Authentication section covers attacks that target a website's method of validating the identity of a user, service, or application. The authorization section covers attacks that target a website's method of determining if a user, service, or application has the necessary permissions to perform requested action.
Information leakage
Information leakage is when a website reveals sensitive data, such as developer comments or error messages, which may aid an attacker in exploiting the system.
Predictable resource location
Predictable resource location is an attack technique used to uncover hidden website content and functionality.
Command execution
Command Execution. Many web applications call operating system processes via the command line. If your application calls out to the OS, you need to be sure command strings are securely constructed.
Vulnerability scan
A vulnerability scan is an attack technique that uses an automated security program to probe a web application for software vulnerabilities.
Brute force
Brute force attack is an outside attempt by hackers to access post-logon pages of a website by guessing usernames and passwords;
Brute Force Meaning A Brute Force attack can be defined as an error or trial technique used by various application programs for decoding encrypted data like DES (Data Encryption Standard) or password keys. An application of Brute Force attack proceeds from each possible set of legal characters within the sequence..
Denial of Service
Denial of service (DoS) is an attack technique that overwhelms system resources to prevent a web site from serving normal user activity.
Trojan/Backdoor/Spyware
Attackers use Trojan horse, backdoor, and spyware attacks to try to circumvent a web servers or web applications built-in security by masking the attack within a legitimate communication. For example, an attacker may include an attack in an email or Microsoft Word document, and when a user opens the email or document, the attack launches.
Other application attacks
This attack category represents attacks that do not fit into the more explicit attack classifications.
Abuse of functionality
Abuse of functionality is an attack technique that uses a website's own features and functionality to consume, defraud, or circumvent the applications access control mechanisms.
Cross-site scripting (XSS)
Cross-site scripting (XSS) is an attack technique that forces a website to echo attacker-supplied executable code, which loads in a user's browser.
Server-side code injection
SSI injection (server-side include) is a server-side exploit technique that allows an attacker to send code into a web application, which is then run locally by the web server.
SQL injection
SQL Injection is an attack technique used to exploit websites that construct SQL statements from user-supplied input.
Detection evasion
Detection evasion is an attack technique that attempts to disguise or hide an attack to avoid detection by an attack signature.
Path traversal
The path traversal attack technique forces access to files, directories, and commands that potentially reside outside the web document root directory.
LDAP injection
LDAP injection is an attack technique used to exploit web sites that construct LDAP statements from user-supplied input.
Forceful Browsing
Forceful Browsing attacks attempt to access data outside the specific access schema of the application.
HTTP parser attack
HTTP parser attacks attempt to execute malicious code, extract information, or enact Denial of Service by targeting the HTTP parser directly.
HTTP Request Smuggling
HTTP Request Smuggling attacks attempt to encapsulate one request within another request through a web proxy.
HTTP Response Splitting
HTTP Response Splitting attacks attempt to manipulating the server into inject a CR/LF sequence in its response headers.
Injection Attempt
Injection Attempt attacks exploit weakness in various other applications in order to inject and/or execute malicious code.
Malicious File Upload
Malicious File Upload attacks attempt to exploit services by uploading files that may contain malicious code.
Non Browser Client
Non Browser Client attacks use crawlers or other scripts to simulate human activity.
Other application activity
This attack category represents attacks that do not fit into the more explicit attack classifications.
Parameter tampering
Parameter Tampering attacks attempt to manipulate and capture data by modifying parameters in HTTP query strings.
Remote file include
Remote file location attacks attempt to exploit web applications that may retrieve and execute the code included in remote files.
Server side code injection
Server side code injection attempts to exploit weakness in applications and services to force those services to execute malicous code.
Session Hijacking
Session hijacking attacks attempt to hijack a valid extant user session.
Web Scraping
Web scraping attacks simulate human exploration of the Web to harvest site information.
XML Parser Attack
XML parser attacks attempt execute malicious code or enact a Denial of Service by targeting the XML parser directly.
XPath Injection
XPath Injection is an attack technique used to exploit applications that construct XPath (XML Path Language) queries from user-supplied input to query or navigate XML documents.