web_vulnerabilities_surveyofcomputer.pptx

sagarmeena775533 0 views 8 slides Sep 17, 2025
Slide 1
Slide 1 of 8
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8

About This Presentation

COMPUTER


Slide Content

Web Application Vulnerabilities — Survey Overview Common vulnerabilities, exploitation techniques, and mitigations (Practical for bug bounty hunters)

Top Web Risks (example) • Injection (SQL, NoSQL, Command) • Broken Authentication & Session Management • Cross-Site Scripting (XSS) and CSRF

Injection Attacks • Cause: unsanitized input passed to interpreters. • Examples: SQLi, command injection, template injection. • Testing tips: use payloads, observe error messages, time-based techniques.

XSS & CSRF • XSS allows JS execution in victim's browser. • CSRF forces authenticated actions; mitigations: same-site cookies, tokens.

Auth & Access Control Issues • Insecure direct object references (IDOR) • Weak password resets and session fixation • Test: role-based testing, parameter tampering.

Exploitation Workflow (Bug Bounty) • Reconnaissance -> Fuzzing/input discovery -> Exploitation -> Reporting • Always follow program rules & avoid destructive testing.

Mitigations & Best Practices • Input validation & prepared statements • Secure defaults, proper session management • Continuous testing: SAST/DAST and red-team exercises

References & Resources • OWASP Top Ten, PortSwigger Academy, relevant research papers • Bug bounty platforms' disclosure guidelines (HackerOne, Bugcrowd)