What are the Attacks I see on my Cloudbric Dashboard?

If you log into your own dashboard, you can see which types of attacks attempted to attack your website by month. Just filter the dates that you want to analyze, and you can see your total website visits compared to the attempted hack attacks.

In the below example, you can see that this month, there were a variety of hack attacks attacking this website (Include Injection, Cross Site Scripting, Identity Theft, etc).

However, what exactly are these web attacks and their risks? Below, you can find the purposes associated to each of the attacks that your website was protected against as well as their implications.

Types of Web Attacks and Their Purposes and Implications

Buffer Overflow

Triggers server overrun by excessive data input beyond its capacity.

SQL Injection

Inserts malicious SQL queries in a website in order to access unauthorized data in a database.

Cross Site Scripting

Redirects visitors to phishing sites or extracts their information by malicious code insertion in a web server.

Stealth Commanding

Involves code execution, which can allow a hacker to take over the server.

Error Handling

Intentionally causes server-side errors in order to investigate server information.

Directory Listing

Attempts to disclose directory structure in a server.

Request Header Filtering

Discloses server information or causes server-side error by sending abnormal request headers.

Directory Traversal

Tries to move to a higher directory through unicode vulnerability.

Request Method Filtering

Potentially shuts down the server by sending abnormal request methods.

Extension Filtering

Tries to upload a file with suspicious file extensions.

Invalid URL

Could cause error by requesting an abnormal URI to the server.

Response Header Filtering

Exposes web server data due to attacks focusing on information included in HTTP Response.

Privacy Output Filtering

Extracts sensitive data in a server.

User Defined Pattern

Malicious attack pattern requests identified by Cloudbric.

Invalid HTTP

Causes an error by sending an abnormal HTTP request form.

Include Injection

Redirects visitors to other unrequested sites by inserting malicious code in the server.

File Upload

Tries to upload malware onto a server.


Continuously sends abnormal requests to cause server malfunction.

Parameter Tampering

Sends parameter values that were not originally requested by the web server or manipulates parameters sent from the web server.

Cookie Poisoning

Modifies cookie settings of web visitors.

Privacy File Theft

Steals sensitive information found in private files.

Privacy Input Filtering

Uploads sensitive information files to a web server.

Suspicious Access

Continuously sends abnormal requests.

URL Access Control

Attempts to gain access to certain URIs and files.

Website Defacement

Attempts to deface or vandalize a website.

Improper Contents

Sends improper strings/contents to the server.

Cloudbric detects and constantly monitors these suspicious activities and blocks all malicious attacks. If you have any questions about these hack attacks or your Cloudbric protection, please comment below for customer support.

Have more questions? Submit a request


Powered by Zendesk