In: Computer Science
200 words or more, please.
Web application and Role of IIS:
Web application is an application that runs on web browser and uses web server . It can be accessed anywhere and anytime around the world by using Internet. For this IIS is needed. IIS stands for Internet Information Services . It plays a very important role in the fuctioning of the web application. IIS is a adaptable web server from Microsoft which runs on Windows OS systems in order to serve the requested HTML pages or files.It accepts the request of remote client and gives back the response accordingly. This provides the basic functionality of sharing and delivering the information across Local Area Network(LAN) and Wide Area Network (WAN).IIS supports various protocols such as HTTP, HTTPS,SMTP,FTP. It works of variety of standard languages such as HTML(Hyper Text Markup Language).
So ,basically IIS makes use of these protocols in order to get the HTML pages and other files which are requested by the user .
Difference between Web application and OS based Application:
1. OS based applications can be only accessed from the system on which is installed whereas Web Application can be accessed from anywhere using Internet.
2.OS based applications can directly functions on the system on which it is installed whereas Web Application needs IIS Server in order to run the application.
3.It is bit specific i.e if the application is designed for a 32-bit OS it will not work on 64-bit OS whereas Web Application does not depend on the system type.
4. Examples of OS applications:MS word,MS Excel ,Adobe Photoshop.
Examples of Web Applications:Chrome, Firefox,Internet Explorer.
Vulnerabilities to utilizing web applications on a web server.
1.SQL Injection
It is an application security weakness that allows attackers to control an application’s database by letting them to access or delete data or change an application’s data-driven behavior, and do other undesirable things by tricking the application into sending unexpected SQL commands. It happens when an application fails to sanitize the untrusted data like data in the web form fields.
Classes of SQL injection:
2.Cross Site Scripting (XSS)
This attack is a type of injection, in which malicious scripts are injected into otherwise trusted websites. It generally occurs when an attacker uses a web application to send malicious code, in the form of a browser side script, to a different end user.The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code in a legitimate web page or web application.The actual attack occurs when the victim visits the web page or web application that executes the malicious code.
Categories of XSS attacks
3. Format String
Format strings are used quite often in functions such as printf and scanf.The Format String exploit occurs when the submitted data of an input string is evaluated as a command by the application.In this way, the attacker could execute code, read the stack, or cause a segmentation fault in the running application, causing new behaviors that could compromise the security or the stability of the system.It alters the flow of an application. They use string formatting library features to access other memory space.Vulnerabilities occur when user supplied data is deployed directly as formatting string input for certain C/C++ functions (e.g., fprintf, printf, sprintf, setproctitle, syslog, ...).