O'Reilly logo

Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely by Lori Mac Vittie

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

 

CHAPTER 3: THREAT VECTORS

As we have seen, there are a wide variety of ways in which attackers can exploit web applications. Many of the available attack surfaces provide miscreants with the ability to carry out several different types of attacks. Attackers, it turns out, are not all motivated by the same end goals. Some attack for profit, others for fun, others for revenge, and some are in the business of collecting end-user systems that can later be rented out to attackers for nefarious purposes.

The end goal of the attackers – the human part of the equation– is outside the scope of this book. The technical reasons for attacks will be the focus of this chapter.

There are three distinct threat vectors for applications upon which attackers ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required