ethical hacking

Human Attacks on Web Applications

Humans can use technologies in either harmful or helpful ways.

And while, as a software developer, you are legally not responsible for the actions of people who use your applications, you are, however, required to take certain responsibility for them.

Here is a list of disruptions or breaches a ‘malicious’ human can cause your application:

  1. Abuse of Storage

Websites which allow their users to keep a record or post photos are usually vulnerable to abuse of storage.

Abusers can store inflammatory or illegal contents on such site without fear that it can be traced back to their own servers.

There are also those who just want a free storage space that they would otherwise have to pay.

2. Sock Puppets

Websites which requests for users’ opinions, feedbacks or comments are vulnerable to the Sock Puppet Attack.

In a sock puppet attack, an abuser can register under a misleading name or may even register multiple different names.

This is usually done in order to sway public opinions, orchestrate multiple conversations with multiple accounts, or just start a quarrel.

An abuser may also intend to create an illusion of overwhelming support for a particular opinion.

Examples of sock puppet attack include posting of fake reviews on e-commerce sites and creating fake social media accounts.

3. Defamation

Similar to the Sock Puppet Attack in some respect, an abuser can your application to post damaging contents about other people which could incur relentless and unnecessary court battles.

One safe precaution is to put up comment moderation and legal disclaimars.

4. Trolls And Pranksters

Trolls are users who post scandalous comments and sarcastic assertions just to get your attention. They enjoy receiving and giving out such attacks.

Pranksters on the other hand might pretend to be someone else or may figure out a way to distract other users from the real issue.

Most technical pranksters can also insert HTML of Javascript snippets to distort your page appearance.

These are some of the attacks that can be performed on your application. Make sure to take the necessary precaution when building your next application.

Recent Posts

AWS Expands Payment Options for Nigerian Customers, Introducing Naira (NGN) for Local Transactions

Amazon Web Services (AWS) continues to enhance its customer experience by offering more flexible payment…

3 days ago

Why JavaScript Remains Dominant in 2025

JavaScript, often hailed as the "language of the web," continues to dominate the programming landscape…

4 days ago

Amazon Moves to Upgrade Alexa with Generative AI Technology

Amazon is accelerating efforts to reinvent Alexa as a generative AI-powered “agent” capable of performing…

5 days ago

Smuggled Starlink Devices Allegedly Used to Bypass India’s Internet Shutdown

SpaceX's satellite-based Starlink, which is currently unlicensed for use in India, is reportedly being utilized…

6 days ago

Why Netflix Dumped React For its Frontend

Netflix, a pioneer in the streaming industry, has always been at the forefront of adopting…

6 days ago

Microsoft Files Lawsuit Against Hacking Group Misusing Azure AI for Malicious Content Generation

Microsoft has announced legal action against a 'foreign-based threat actor group' accused of running a…

1 week ago