The vulnerability of the system (technological, communication) of the cyber protection object to negative technical impact is always based on the exploitation of its defects. Defect is a property of software, hardware, software-hardware or system components, which under certain conditions can lead to vulnerability. Attack – an attempt to exploit a defect(s) of the system (object of cyber protection) for the implementation of a negative technical effect (unauthorized reading/writing of data, incorrect operation, circumvention of protective mechanisms, abnormal consumption of resources; execution of imposed commands, etc.) under the manifestation of vulnerability using an exploit (exploit). The appearance of defects is inherent in all stages of the system (cyber protection object) life cycle. Thus, defects are distinguished at the design stage, implementation, adjustment during commissioning, maintenance, and completion of work. The existence of at least one defect in the components of the system, which allows a negative technical effect, makes it vulnerable. Timely detection and elimination of defects reduces the probability of system compromise using at least known exploits. The expediency, rationality and reasonableness of solutions for finding defects is based on the application of proven sources of world-class expert experience. Thus, Adversarial Tactics, Techniques & Common Knowledge defines Server-side Web Application class systems as an attractive attack target for hackers with the highest average number of potential defects in at least three components: Web Server, Web Application Server, DBMS Server. To find out the distribution of Server-side Web Application defects by characteristic classes, it is necessary to use the Open Worldwide Application Security Project, for a detailed study of them - Common Weakness Enumeration. The application of the National Vulnerability Database and Common Vulnerabilities and Exposures complements the evaluation of the found defect.
Read full abstract