1. INJECTION ATTACKS
2. CROSS SITE SCRIPTING ATTACKS
3. BROKEN AUTHENTICATION AND SESSION MANAGEMENT ATTACKS
4. CLICKJACKING ATTACKS
5. DNS CACHE POISONING
6. SOCIAL ENGINEERING ATTACKS
7. SYMLINKING – AN INSIDER ATTACK
8. DDOS ATTACK – DISTRIBUTED DENIAL OF SERVICE ATTACK
9. REMOTE CODE EXECUTION ATTACKS
10. CROSS SITE REQUEST FORGERY ATTACKS
No comments:
Post a Comment