Member-only story

Cyber Security: Application Attacks

Jesse L
3 min readOct 2, 2021

--

Hi everyone, welcome back. Cyber security is an important area of focus. There is a whole lot of data that is being stored digitally, and this includes sensitive data that could potentially cause damage to someone or even a whole company. We will go over some attack methods and strategies that hackers might use so you can be aware of them.

Privilege Escalation

A privilege escalation attack occurs when an attacker gains privileged access to a machine or network. Privileged roles could include administrator or root. Attackers may gain privileged access through various methods including misconfigurations, malware, social engineering, and other vulnerabilities or exploits. With privileges, attackers have access to resources that would not normally be seen by users and the application.

Cross Site Scripting

Cross Site Scripting is used to exploit a vulnerability in a web application to hijack a session. Malicious code is sent through a web browser and is capable of redirecting a victim to content provided by the attacker. The attacker is also capable of performing actions on the victims machine through a web browser. Cross Site Scripting can also be used with emails and blog posts where a malicious link is posted. The malicious link contains malicious code that then executes within a…

--

--

Jesse L
Jesse L

Written by Jesse L

Hi, I'm a passionate technology enthusiast and lifelong learner. Beyond my technical pursuits, I'm also passionate about sharing my enthusiasm with others.

Responses (1)