• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

Web-Hacking-Incident-Database

This version was saved 12 years, 10 months ago View current version     Page history
Saved by Ryan Barnett
on May 23, 2011 at 2:50:40 pm
 


 

Project Overview

 

The Web Hacking Incident Database, or WHID for short, is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents.  WHID's goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. WHID has been featured in Information Week and slash dot.

 

"Thanks so much for the WHID, having a public repository such as this makes it easier for security practitioners to justify what they do for their colleagues. You make my job easier, thanks!"

-Erik Cabetas, Security Officer for a large E-Commerce website.

 

The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability. We also try to limit the database to targeted attacks only. Please refer to the FAQ for further information on what you will find and what you will not find in WHID.

If you have additional information on those or other web hacking incidents, you are more than welcome to share this information with us (rcbarnettgmail.com).

 

Project Leader

Ryan C. Barnett is a Senior Security Researcher on Trustwave's SpiderLabs Research Team where his focus is web application firewall technology and virtual patching. In addition to working with Trustwave, he is also a SANS Institute certified instructor where he teaches web application security courses and serves on the CWE/SANS Top 25 Worst Programming Errors Team.  Ryan is also a Web Application Security Consortium (WASC) Member where he leads the Web Hacking Incidents Database (WHID) and Distributed Open Proxy Honeypots Projects.  He also serves as the Open Web Application Security Project (OWASP) ModSecurity Core Rule Set (CRS) project leader. Mr. Barnett is a frequent speaker at security industry conferences such as Blackhat, OWASP and SANS and has also authored a Web security book for Addison/Wesley Publishing entitled Preventing Web Attacks with Apache

 

If you would like to be involved with the project, please contact the project leader - Ryan Barnett (rbarnetttrustwave.com).

 

 

Project Contributors

  • Ofer Shezaf (Former Project Leader)
  • Jeremiah Grossman
  • Robert Auger

 

Project Sponsors

Project reports are provided by Trustwave's SpiderLabs.

 


Keep Track of the Latest WHID Entries

WHID Mail-list

http://lists.webappsec.org/mailman/listinfo/wasc-whid_lists.webappsec.org

 

RSS Feeds

Main Feed

Finance Vertical Feed

Retail Vertical Feed

Government Vertical Feed

Web 2.0 Vertical Feed

Entertainment Vertical Feed

 

 

Twitter Feed

@wascwhid

 

Loading http://twitter.com/statuses/user_timeline/127584231.rss…

 

Real-Time Statistics

 

 

The default views show all Attack, Weakness and Outcomes for all Vertical Markets.  If you prefer, you may optionally apply two filters:

 

WHID ID - default is to show all entries.  You can optionally specify a YEAR (example - enter "2009") to see all results from that year.

Attacked Entity Field -  this applies a Vertical Market-View by selecting an Attacked Entity Field option from the drop-down lists.  This will then show you the data for your chosen market field. 

WHID Views

 

Geographic View

 

 

 

Search the WHID Database

 

Management View

Use the search filtering below to select the "Outcome" of interest to you and your business and then review which Attack Methods and Application Weaknesses lead to this Outcome.

 

Security Analyst View

Use the search filtering below to select the "Attack Method" of interest to you and your business (perhaps you know that your sites are vulnerable to SQL Injection) and then review the underlying Application Weakness and potential Outcomes.  This data will help to facilitate discussions with both Management and Developers.

 

Developer View

Use the search filtering below to select the "Application Weakness" of interest to you and your business and then review the various Attack Methods that may exploit the weakness and the different potential Outcomes.

 

 

 

 

 

Submit an Incident

 

 

 

Frequenty Asked Questions

 

Reports

 

Presentations

The Web Hacking Incident Database Update for 2009 by Ryan Barnett at the OWASP AppSec DC Conf 2009

 

The Web Hacking Incidents Database -- Ryan Barnett from OWASP DC on Vimeo.

Analysis of the Web Hacking Incident Database (WHID) 2008 by Ofer Shezaf at the OWASP AppSec NYC Conf 2008

 

 

Disclaimers

WHID is based entirely on public information. All the incidents listed here where reported publicly before on other web sites and each incident includes references to those sites. Please also note that unless mentioned otherwise all the vulnerabilities listed have already been fixed.

 

Comments (0)

You don't have permission to comment on this page.