Injection and Broken Access Control
Injection and Broken Access Control
Introduction
Injection attack refer to a broad class of attack vectors. An injection attack involves providing
unreliable input to a program as part of a command or query, an interpreter processes this
input, this in turn alters how that program runs.
Date of discovery
SQL injection is one of the oldest types of injection. Jeff Forristal, a hacker and researcher in
the field of cybersecurity, first documented the SQL injection exploit in 1998
Date of discovery
The broken access control first appeared on the OWASP top 10 2017 list in position 5, it is a
result of merging A4-Insecure Direct Object References and A7-Missing Function Level
Access from OWASP top 10 2013 list.
References
1. Injection Attack vectors
What Are Injection Attacks? - DZone Security
2. Injection Date
What is SQL injection - Examples & prevention | Malwarebytes
3. GhostShell attack
GhostShell university hack: By the numbers | ZDNET.
4. Turkish government
Hackers RedHack Leak Details of Hundreds of Turkish Government Officials
(ibtimes.co.uk)
5. 7-Eleven breach
7-Eleven statement regarding 2007 credit card fraud (databreaches.net)
6. HBGary breach
HBGary breach revelations and repercussions - Help Net Security
SQL Injection Attack: Real Life Attacks and Code Examples (brightsec.com)
7. Broken Access Control date
OWASP 2017 top 10 vs. 2013 top 10 | Infosec Resources (infosecinstitute.com)
8. Broken Access Control Attack vectors
OWASP Broken Access Control Attack And Its Prevention (crashtest-security.com)
9. Broken Access Control common fixes
How to Prevent Broken Access Control? - GeeksforGeeks
10. Snapchat attack
Real Life Examples of Web Vulnerabilities (OWASP Top 10) (horangi.com)