This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Automated Threats to Web Applications"

From OWASP
Jump to: navigation, search
m (Automated Threats)
(Introduction: Links to OAT wiki pages)
Line 232: Line 232:
 
==Introduction==
 
==Introduction==
  
The list of [[:Category:Automated Threat|automated threat events]] and summary descriptions, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:
+
The A-Z list of [[:Category:Automated Threat|automated threat events]] and summary descriptions, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:
  
 
{| cellpadding="2"
 
{| cellpadding="2"
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-020'''   Account Aggregation
+
[[OAT-020 Account Aggregation]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Use by an intermediary application that collects together multiple accounts and interacts on their behalf.
 
Use by an intermediary application that collects together multiple accounts and interacts on their behalf.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-019'''   Account Creation
+
[[OAT-019 Account Creation]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Create multiple accounts for subsequent misuse.
 
Create multiple accounts for subsequent misuse.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-003'''   Ad Fraud
+
[[OAT-003 Ad Fraud]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
False clicks and fraudulent display of web-placed advertisements.
 
False clicks and fraudulent display of web-placed advertisements.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-009'''   CAPTCHA Defeat
+
[[OAT-009 CAPTCHA Defeat]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Solve anti-automation tests.
 
Solve anti-automation tests.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-010'''   Card Cracking
+
[[OAT-010 Card Cracking]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Identify missing start/expiry dates and security codes for stolen payment card data by trying different values.
 
Identify missing start/expiry dates and security codes for stolen payment card data by trying different values.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-001'''   Carding
+
[[OAT-001 Carding]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Multiple payment authorisation attempts used to verify the validity of bulk stolen payment card data.
 
Multiple payment authorisation attempts used to verify the validity of bulk stolen payment card data.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-012'''   Cashing Out
+
[[OAT-012 Cashing Out]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Buy goods or obtain cash utilising validated stolen payment card or other user account data.
 
Buy goods or obtain cash utilising validated stolen payment card or other user account data.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-007'''   Credential Cracking
+
[[OAT-007 Credential Cracking]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Identify valid login credentials by trying different values for usernames and/or passwords.
 
Identify valid login credentials by trying different values for usernames and/or passwords.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-008'''   Credential Stuffing
+
[[OAT-008 Credential Stuffing]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Mass log in attempts used to verify the validity of stolen username/password pairs.
 
Mass log in attempts used to verify the validity of stolen username/password pairs.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-021'''   Denial of Inventory
+
[[OAT-021 Denial of Inventory]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Deplete goods or services stock without ever completing the purchase or committing to the transaction.
 
Deplete goods or services stock without ever completing the purchase or committing to the transaction.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-015'''   Denial of Service
+
[[OAT-015 Denial of Service]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS).
 
Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS).
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-006'''   Expediting
+
[[OAT-006 Expediting]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Perform actions to hasten progress of usually slow, tedious or time-consuming actions.
 
Perform actions to hasten progress of usually slow, tedious or time-consuming actions.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-004'''   Fingerprinting
+
[[OAT-004 Fingerprinting]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Elicit information about the supporting software and framework types and versions.
 
Elicit information about the supporting software and framework types and versions.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-018'''   Footprinting
+
[[OAT-018 Footprinting]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Probe and explore application to identify its constituents and properties.
 
Probe and explore application to identify its constituents and properties.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-005'''   Scalping
+
[[OAT-005 Scalping]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Obtain limited-availability and/or preferred goods/services by unfair methods.
 
Obtain limited-availability and/or preferred goods/services by unfair methods.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-011'''   Scraping
+
[[OAT-011 Scraping]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Collect application content and/or other data for use elsewhere.
 
Collect application content and/or other data for use elsewhere.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-016'''   Skewing
+
[[OAT-016 Skewing]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Repeated link clicks, page requests or form submissions intended to alter some metric.
 
Repeated link clicks, page requests or form submissions intended to alter some metric.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-013'''   Sniping
+
[[OAT-013 Sniping]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Last minute bid or offer for goods or services.
 
Last minute bid or offer for goods or services.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-017'''   Spamming
+
[[OAT-017 Spamming]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Malicious or questionable information addition that appears in public or private content, databases or user messages.
 
Malicious or questionable information addition that appears in public or private content, databases or user messages.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-002'''   Token Cracking
+
[[OAT-002 Token Cracking]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Mass enumeration of coupon numbers, voucher codes, discount tokens, etc.
 
Mass enumeration of coupon numbers, voucher codes, discount tokens, etc.
 
   |-
 
   |-
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
'''OAT-014'''   Vulnerability Scanning
+
[[OAT-014 Vulnerability Scanning]]
 
   | align="left" valign="top" |  
 
   | align="left" valign="top" |  
 
Crawl and fuzz application to identify weaknesses and possible vulnerabilities.
 
Crawl and fuzz application to identify weaknesses and possible vulnerabilities.

Revision as of 12:02, 26 February 2018

Lab big.jpg
Automated-threats-header.jpg

Automated Threats to Web Applications

The OWASP Automated Threats to Web Applications Project has completed a review of reports, academic and other papers, news stories and vulnerability taxonomies/listings to identify, name and classify these scenarios – automated by software causing a divergence from accepted behavior producing one or more undesirable effects on a web application, but excluding tool-based exploitation of single-issue vulnerabilities. The initial objective was to produce an ontology providing a common language for developers, architects, operators, business owners, security engineers, purchasers and suppliers/ vendors, to facilitate clear communication and help tackle the issues. The project also identifies symptoms, mitigations and controls in this problem area. Like all OWASP outputs, everything is free and published using an open source license.

Two page summary project briefing as a PDF.

Description

Web applications are subjected to unwanted automated usage – day in, day out. Often these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is commonly mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the primary intent. Frequently these have sector-specific names. Most of these problems seen regularly by web application owners are not listed in any OWASP Top Ten or other top issue list. Furthermore, they are not enumerated or defined adequately in existing dictionaries. These factors have contributed to inadequate visibility, and an inconsistency in naming such threats, with a consequent lack of clarity in attempts to address the issues.

Without sharing a common language between devops, architects, business owners, security engineers, purchasers and suppliers/vendors, everyone has to make extra effort to communicate clearly. Misunderstandings can be costly. The adverse impacts affect the privacy and security of individuals as well as the security of the applications and related system components.

Automated Threats

The list of threat events, defined more fully in the OWASP Automated Threat Handbook, is:

Not sure which is which? Use the threat identification chart in conjunction with the full handbook.

Licensing

All the materials are free to use. They are licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.

© OWASP Foundation

What Is This?

Information and resources to help web application owners defend against automated threats

What Isn't It?

  • Another vulnerability list
  • Threat modelling
  • Attack trees
  • Non web
  • Non application

Project Objective

This project brings together research and analysis of real world automated attacks against web applications, to produce documentation to assist operators defend against these threats. Sector-specific guidance will be available.

Presentation

Automatedthreats-presentation-small.jpg

Project Leaders

Related Projects

Quick Links

News and Events

  • [16 Feb 2018] OAT wiki pages created
  • [15 Feb 2018] v1.2 Handbook published
  • [25 Sep 2017] Promoted to Labs status
  • [19-20 Sep 2017] Working session at the AppSecUSA 2017 Project Summit
  • [15 May 2017] Draft feedback on Top Ten A7 shared
  • [17 Apr 2017] Slides from AppSec California (2017)
  • [20 Dec 2016] Threat identification chart published
  • [03 Nov 2016] Presentation at LASCON 2016
  • [03 Nov 2016] v1.1 Handbook published
  • [11-12 Oct 2016] Working session at the AppSecUSA 2017 Project Summit
  • [04 Aug 2016] Project Q&A at Blackhat USA 2-5pm in the OWASP booth
  • [26 Oct 2015] v1.01 handbook published
  • [24 Sep 2015] Presentation at AppSec USA 2015

In Print

AutomatedThreatHandbook small.jpg

The Automated Threat Handbook can be purchased at cost as a print on demand book.

Classifications

Owasp-labs-trans-85.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files DOC.jpg