What types of attacks on a website are there? |

by Kelvin
What types of attacks on a website are there? |

What types of attacks on a website are there? | 1

On many occasions, you may suffer interference on the website. In this post, we will show you how to discover the weaknesses and attacks on a Web page. If you are an avid computer reader, then stay with us so you can avoid attacks on the pages you drive.

Common Attacks on a Web Page

Before going into the matter of how to discover the weaknesses and attacks on a web page, we will talk about the most common attacks. When we talk about web page attacks, we can refer to many things. First, it seeks to violate its security.


One of the most common ways to attack a web page is the use of script encryption.. This uses the so-called eval, base64_decode or base64 command. What this coding does is create a lot of spam. In addition, it aims at the frontal attack on other servers.

Usually, when this happens, those who manage the page, realize that this happens, when it is too late. That is, the website crashes and it is when you realize that something bad happens. If you are the one in charge of administering the page, you can realize that the page has suffered an attack. In this way, you can now discover the weaknesses and attacks on a web page.

Types of Web Page Attacks

Next, we will give you a list with their respective web links, of the most used aggressions towards the web pages. This will serve as a reference when you know what type of attack your website may be suffering

  • Man in the middle MITM spoofing attack
  • DHCP Spoofing
  • Shellshock Simple
  • Port stealing
  • Keylogger
  • SQL Injection

What types of attacks on a website are there? | 2

Causes of Attacks on a Web Page

Below we show you the causes for which you can suffer attacks on your website.

The Security of your Website Presents Failures

You can inject a code. You must send a url code. If this data is not validated when you run the web, then the page is highly vulnerable. In fact, if we take a random page from the list that Google gives us and send the variable “a” in id, we rectify whether it is vulnerable or not.

If we want to avoid this problem, the data entered by url must be valid. Otherwise, our page will continue to present security problems.

Use of Sessions and Cookies

These types of failures arise by virtue of the misuse of sessions. The user uses logs or tries to authenticate his user, to access a social network or other page. When we save passwords, We must be very careful that this page is a safe site.

Cross-Site Scripting (XSS)

Like the failures explained above, it is executed, at the time of sending a parameter by url. It may happen that the proper validation of the data we have provided is not performed. You can test if your website is vulnerable to an XSS attack, by entering this: