Introduction

Web servers are where websites are stored and hosted. These servers are just computers running an operating system like Windows or Linux. Operating systems allow users to interact with their computers by sending information to the application, which sends the information to the operating system. Any vulnerabilities would lead to an attack on the web server. An attempt to target and disrupt web servers is called a web server attack.

Types of Web Server Attacks

Denial of Service (DOS) or Distributed Denial of Service (DDOS) attacks occur when a malicious actor sends many requests to a server. This overwhelms the server and causes it to slow down or crash. Authorized users will then be denied access to the server. In DOS attacks, only one device is used, while in DDOS attacks, multiple devices are used.

Cross-site Hijacking (XSS) attacks target a website’s scripting flaws. Malicious scripts are injected into web applications. The user’s browser cannot tell if a script is trustworthy because it came from a trusted website or source. The script can access cookies, session tokens, or other sensitive information retained by the web browser. They can even rewrite the contents of the webpage.

SSH (Secure Shell) Brute Force Attack is an attack brute-forcing SSH login credentials to obtain access. SSH, or Secure Shell, is a cryptographic network protocol that allows users to securely access and control remote systems over an unsecured network. This exploit can be used to send malicious files without being noticed. Unlike other attacks, these attacks aren’t reliant on existing vulnerabilities.

Website Defacement attacks are attacks used to deface websites. It is an SQL, used for databases, injection attack where the malicious actor can add strings to a query that is executed by the web browser. When the website is requested, the malicious data in the database will show irrelevant data on the website, thus defacing the website.

    How to Prevent These Attacks

    Keep your systems updated. Malicious actors can take advantage of flaws in outdated systems. This leaves your system more vulnerable to attacks.

    Install an Anti-virus. This type of software is designed to block, identify, and respond to dangerous software. It is also important to regularly update your anti-virus software to ensure that a new virus can’t infiltrate your system.

    Use IDS (Intrusion Detection Systems). These systems are prevention systems that identify and prevent threats from affecting your secure networks.

    Back up your data. In case of an attack and data is lost, you can recover your data.

      Conclusion

      Knowing some web server attacks can give insight into what security measures need to be in place to stop malicious actors from stealing data. This also helps that web serves run smoothly which is vital for providing content and online servers. Remember that it is always important to update your systems and monitor activity to ensure a secure web environment.

      Resources

      https://www.geeksforgeeks.org/web-server-and-its-types-of-attacks/#

      https://www.greycampus.com/opencampus/ethical-hacking/web-server-and-its-types-of-attacks

      https://owasp.org/www-community/attacks/xss/

      Hayden Duplantier, Associate Information Security Analyst

      Hayden is beginning his cybersecurity career as an Associate ISA on Team Atlas, starting out performing remote social engineering tests. He is currently earning a Bachelor of Science in Computer Science from Louisiana State University, expected to graduate in May 2025. He is currently working toward his Security+ certification, and also plans to pursue a Masters in Cybersecurity from LSU.