The Web Hacking Incident Database, or WHID for short, is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. WHID's goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. WHID has been featured in Information Week and slash dot.
"Thanks so much for the WHID, having a public repository such as this makes it easier for security practitioners to justify what they do for their colleagues. You make my job easier, thanks!" -Erik Cabetas, Security Officer for a large E-Commerce website. |
The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability. We also try to limit the database to targeted attacks only. Please refer to the FAQ for further information on what you will find and what you will not find in WHID.
If you have additional information on those or other web hacking incidents, you are more than welcome to share this information with us (rcbarnettgmail.com).
Ryan C. Barnett is a Senior Security Researcher on Trustwave's SpiderLabs Research Team where his focus is web application firewall technology and virtual patching. In addition to working with Trustwave, he is also a SANS Institute certified instructor where he teaches web application security courses and serves on the CWE/SANS Top 25 Worst Programming Errors Team. Ryan is also a Web Application Security Consortium (WASC) Member where he leads the Web Hacking Incidents Database (WHID) and Distributed Open Proxy Honeypots Projects. He also serves as the Open Web Application Security Project (OWASP) ModSecurity Core Rule Set (CRS) project leader. Mr. Barnett is a frequent speaker at security industry conferences such as Blackhat, OWASP and SANS and has also authored a Web security book for Addison/Wesley Publishing entitled Preventing Web Attacks with Apache
If you would like to be involved with the project, please contact the project leader - Ryan Barnett (rbarnetttrustwave.com).
Project reports are provided by Trustwave's SpiderLabs.
http://lists.webappsec.org/mailman/listinfo/wasc-whid_lists.webappsec.org
If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:
These visualizations show Attacks, Weaknesses and Outcomes for all Vertical Markets for all years (1999-2011). If you want to see custom visualizations, go to the Google Fusion Table WHID project site page and follow these steps:
You can do similar steps to correlate multiple data points such as Vertical Markets.
The WHID data is currently hosted online using Google's Fusion Tables. To search the data, click on "Show Options" and then the "Aggregate" link. You should see a screen similar to this -
Use the Aggregate filtering to select the "Outcome" of interest to you and your business and then review which Attack Methods and Application Weaknesses lead to this Outcome.
Use the Aggregate filtering to select the "Attack Method" of interest to you and your business (perhaps you know that your sites are vulnerable to SQL Injection) and then review the underlying Application Weakness and potential Outcomes. This data will help to facilitate discussions with both Management and Developers.
Use the Aggregate filtering to select the "Application Weakness" of interest to you and your business and then review the various Attack Methods that may exploit the weakness and the different potential Outcomes.
Frequenty Asked Questions
The Web Hacking Incidents Database -- Ryan Barnett from OWASP DC on Vimeo.
WHID is based entirely on public information. All the incidents listed here where reported publicly before on other web sites and each incident includes references to those sites. Please also note that unless mentioned otherwise all the vulnerabilities listed have already been fixed.