Web application security - the fast guide 1.1 | Page 66
Chapter 4 - Be the attacker
P a g e | 66
4.1 Be the Attacker
To be able to have a full understanding of how the attack is taking place you need
to put on the attacker hat and think like a one.
Time and place: Thinking of how, where when is important but actually
it is not that relevant because attacker will try 24/7 from everywhere as
anonymous servers and nodes are available all over the world are ready
to be a hacking initiation point intentionally or accidently.
An exception will be those application that are only available for a preset
time or period.
As most of web application are opened to public all the time the initial
scenario is the one that will stand.
What to target: everything…. all parts of the system should be potential
subject to attack, web platform, application, backend, databases, web
client, transport and last not least the availability because security is like
a chain weak as its weakest part
Mindset: persistence, iterative approach is always fruitful. normally
attackers are pushed by huge ego, powerful feelings and lot of energy.
4.2 Attackers categories
Script kiddies
Cyber-Punks
Old School
Hacker
Professional
criminals
Coders and
Virus writers