TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

Academic Research: Web Application Attacks

2017-10-10 · Read original ↗

ATT&CK techniques detected

3 predictions
T1190Exploit Public-Facing Application
98%
"the graph below : our data for the types of attacks we researched shows that sql injection is by far the most widely used attack method by hackers since 2014, primarily due to the high reward it often yields with a minimal amount of effort and risk on the attacker ’ s part. anoth…"
T1190Exploit Public-Facing Application
97%
". we further refined the quality of our analysis by cross - referencing attacks with common vulnerabilities and exposure resources. three primary data sources were used to identify data breaches by industry and data type : - the privacy rights clearinghouse data breach report use…"
T1190Exploit Public-Facing Application
92%
"academic research : web application attacks numerous studies have concluded that known vulnerabilities within web applications are the preferred method for hackers to attack online businesses. business applications are the tools that allow specific business processes and function…"

Summary

Personally identifiable information and user credentials are the primary nuggets attackers are after when they exploit known vulnerabilities in web applications.