{"id":67,"date":"2020-11-03T11:37:17","date_gmt":"2020-11-03T11:37:17","guid":{"rendered":"https:\/\/codeflarelimited.com\/blog\/?p=67"},"modified":"2020-11-03T11:37:19","modified_gmt":"2020-11-03T11:37:19","slug":"human-attacks-on-web-applications","status":"publish","type":"post","link":"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/","title":{"rendered":"Human Attacks on Web Applications"},"content":{"rendered":"\n<p>Humans can use technologies in either harmful or helpful ways.<\/p>\n\n\n\n<p>And while, as a software developer, you are legally not responsible for the actions of people who use your applications, you are, however, required to take certain responsibility for them.<\/p>\n\n\n\n<p>Here is a list of disruptions or breaches a &#8216;malicious&#8217; human can cause your application:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong><span class=\"has-inline-color has-accent-color\">Abuse of Storage<\/span><\/strong><\/li><\/ol>\n\n\n\n<p>Websites which allow their users to keep a record or post photos are usually vulnerable to abuse of storage.<\/p>\n\n\n\n<p>Abusers can store inflammatory or illegal contents on such site without fear that it can be traced back to their own servers.<\/p>\n\n\n\n<p>There are also those who just want a free storage space that they would otherwise have to pay.<\/p>\n\n\n\n<p>2. <strong><span class=\"has-inline-color has-accent-color\">Sock Puppets<\/span><\/strong><\/p>\n\n\n\n<p>Websites which requests for users&#8217; opinions, feedbacks or comments are vulnerable to the <strong><span class=\"has-inline-color has-accent-color\">Sock Puppet Attack.<\/span><\/strong><\/p>\n\n\n\n<p>In a sock puppet attack, an abuser can register under a misleading name or may even register multiple different names.<\/p>\n\n\n\n<p>This is usually done in order to sway public opinions, orchestrate multiple conversations with multiple accounts, or just start a quarrel.<\/p>\n\n\n\n<p>An abuser may also intend to create an illusion of overwhelming support for a particular opinion.<\/p>\n\n\n\n<p>Examples of sock puppet attack include posting of fake reviews on e-commerce sites and creating fake social media accounts.<\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-accent-color\">3. Defamation<\/span><\/strong><\/p>\n\n\n\n<p>Similar to the Sock Puppet Attack in some respect, an abuser can your application to post damaging contents about other people which could incur relentless and unnecessary court battles.<\/p>\n\n\n\n<p>One safe precaution is to put up comment moderation and legal disclaimars.<\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-accent-color\">4. Trolls And Pranksters<\/span><\/strong><\/p>\n\n\n\n<p>Trolls are users who post scandalous comments and sarcastic assertions just to get your attention. They enjoy receiving and giving out such attacks.<\/p>\n\n\n\n<p>Pranksters on the other hand might pretend to be someone else or may figure out a way to distract other users from the real issue.<\/p>\n\n\n\n<p>Most technical pranksters can also insert HTML of Javascript snippets to distort your page appearance.<\/p>\n\n\n\n<p>These are some of the attacks that can be performed on your application. Make sure to take the necessary precaution when building your next application.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Humans can use technologies in either harmful or helpful ways. And while, as a software developer, you are<\/p>\n","protected":false},"author":1,"featured_media":68,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[14],"tags":[16,15],"class_list":["post-67","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethical-hacking","tag-ethical-hacking","tag-web-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Human Attacks on Web Applications<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Human Attacks on Web Applications\" \/>\n<meta property=\"og:description\" content=\"Humans can use technologies in either harmful or helpful ways. And while, as a software developer, you are\" \/>\n<meta property=\"og:url\" content=\"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/facebook.com\/codeflretech\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-03T11:37:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-03T11:37:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2020\/11\/hacker.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"codeflare\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@codeflaretech\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/human-attacks-on-web-applications\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/human-attacks-on-web-applications\\\/\"},\"author\":{\"name\":\"codeflare\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#\\\/schema\\\/person\\\/7e65653d49add95629f8c1053c5cd76a\"},\"headline\":\"Human Attacks on Web Applications\",\"datePublished\":\"2020-11-03T11:37:17+00:00\",\"dateModified\":\"2020-11-03T11:37:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/human-attacks-on-web-applications\\\/\"},\"wordCount\":349,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/human-attacks-on-web-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/hacker.jpg\",\"keywords\":[\"ethical hacking\",\"web security\"],\"articleSection\":[\"ethical hacking\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/human-attacks-on-web-applications\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/human-attacks-on-web-applications\\\/\",\"url\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/human-attacks-on-web-applications\\\/\",\"name\":\"Human Attacks on Web Applications\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/human-attacks-on-web-applications\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/human-attacks-on-web-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/hacker.jpg\",\"datePublished\":\"2020-11-03T11:37:17+00:00\",\"dateModified\":\"2020-11-03T11:37:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/human-attacks-on-web-applications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/human-attacks-on-web-applications\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/human-attacks-on-web-applications\\\/#primaryimage\",\"url\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/hacker.jpg\",\"contentUrl\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/hacker.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"web security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/human-attacks-on-web-applications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ethical hacking\",\"item\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/ethical-hacking\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Human Attacks on Web Applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/\",\"name\":\"\",\"description\":\"Sustainable solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#organization\",\"name\":\"Codeflare Limited\",\"url\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/codeflare.png\",\"contentUrl\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/codeflare.png\",\"width\":1040,\"height\":263,\"caption\":\"Codeflare Limited\"},\"image\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#\\\/schema\\\/person\\\/7e65653d49add95629f8c1053c5cd76a\",\"name\":\"codeflare\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/59cef917c86d965eea581d2747f51bd6382003a68bfce7c8a4dfec98b4cd838d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/59cef917c86d965eea581d2747f51bd6382003a68bfce7c8a4dfec98b4cd838d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/59cef917c86d965eea581d2747f51bd6382003a68bfce7c8a4dfec98b4cd838d?s=96&d=mm&r=g\",\"caption\":\"codeflare\"},\"description\":\"Latest tech news and coding tips.\",\"sameAs\":[\"https:\\\/\\\/codeflarelimited.com\\\/blog\",\"https:\\\/\\\/facebook.com\\\/codeflretech\",\"https:\\\/\\\/instagram.com\\\/codeflaretech\",\"https:\\\/\\\/x.com\\\/codeflaretech\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCuBLtiYqsajHdqw0uyt7Ofw?sub_confirmation=1\"],\"url\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/author\\\/watcher\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Human Attacks on Web Applications","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/","og_locale":"en_US","og_type":"article","og_title":"Human Attacks on Web Applications","og_description":"Humans can use technologies in either harmful or helpful ways. And while, as a software developer, you are","og_url":"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/","article_author":"https:\/\/facebook.com\/codeflretech","article_published_time":"2020-11-03T11:37:17+00:00","article_modified_time":"2020-11-03T11:37:19+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2020\/11\/hacker.jpg","type":"image\/jpeg"}],"author":"codeflare","twitter_card":"summary_large_image","twitter_creator":"@codeflaretech","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/#article","isPartOf":{"@id":"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/"},"author":{"name":"codeflare","@id":"https:\/\/codeflarelimited.com\/blog\/#\/schema\/person\/7e65653d49add95629f8c1053c5cd76a"},"headline":"Human Attacks on Web Applications","datePublished":"2020-11-03T11:37:17+00:00","dateModified":"2020-11-03T11:37:19+00:00","mainEntityOfPage":{"@id":"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/"},"wordCount":349,"commentCount":0,"publisher":{"@id":"https:\/\/codeflarelimited.com\/blog\/#organization"},"image":{"@id":"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2020\/11\/hacker.jpg","keywords":["ethical hacking","web security"],"articleSection":["ethical hacking"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/","url":"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/","name":"Human Attacks on Web Applications","isPartOf":{"@id":"https:\/\/codeflarelimited.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/#primaryimage"},"image":{"@id":"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2020\/11\/hacker.jpg","datePublished":"2020-11-03T11:37:17+00:00","dateModified":"2020-11-03T11:37:19+00:00","breadcrumb":{"@id":"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/#primaryimage","url":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2020\/11\/hacker.jpg","contentUrl":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2020\/11\/hacker.jpg","width":1920,"height":1080,"caption":"web security"},{"@type":"BreadcrumbList","@id":"https:\/\/codeflarelimited.com\/blog\/human-attacks-on-web-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/codeflarelimited.com\/blog\/"},{"@type":"ListItem","position":2,"name":"ethical hacking","item":"https:\/\/codeflarelimited.com\/blog\/ethical-hacking\/"},{"@type":"ListItem","position":3,"name":"Human Attacks on Web Applications"}]},{"@type":"WebSite","@id":"https:\/\/codeflarelimited.com\/blog\/#website","url":"https:\/\/codeflarelimited.com\/blog\/","name":"","description":"Sustainable solutions","publisher":{"@id":"https:\/\/codeflarelimited.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/codeflarelimited.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/codeflarelimited.com\/blog\/#organization","name":"Codeflare Limited","url":"https:\/\/codeflarelimited.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/codeflarelimited.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2020\/11\/codeflare.png","contentUrl":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2020\/11\/codeflare.png","width":1040,"height":263,"caption":"Codeflare Limited"},"image":{"@id":"https:\/\/codeflarelimited.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/codeflarelimited.com\/blog\/#\/schema\/person\/7e65653d49add95629f8c1053c5cd76a","name":"codeflare","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/59cef917c86d965eea581d2747f51bd6382003a68bfce7c8a4dfec98b4cd838d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/59cef917c86d965eea581d2747f51bd6382003a68bfce7c8a4dfec98b4cd838d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/59cef917c86d965eea581d2747f51bd6382003a68bfce7c8a4dfec98b4cd838d?s=96&d=mm&r=g","caption":"codeflare"},"description":"Latest tech news and coding tips.","sameAs":["https:\/\/codeflarelimited.com\/blog","https:\/\/facebook.com\/codeflretech","https:\/\/instagram.com\/codeflaretech","https:\/\/x.com\/codeflaretech","https:\/\/www.youtube.com\/channel\/UCuBLtiYqsajHdqw0uyt7Ofw?sub_confirmation=1"],"url":"https:\/\/codeflarelimited.com\/blog\/author\/watcher\/"}]}},"jetpack_featured_media_url":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2020\/11\/hacker.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/posts\/67","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/comments?post=67"}],"version-history":[{"count":1,"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/posts\/67\/revisions"}],"predecessor-version":[{"id":69,"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/posts\/67\/revisions\/69"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/media\/68"}],"wp:attachment":[{"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/media?parent=67"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/categories?post=67"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/tags?post=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}