Attacks are groups of attack events that target applications and servers. There are multiple attack types that Contrast can help protect against including, but not limited to:

  • SQL injection

  • XSS

  • Deserialization

  • Command injection

  • Many other common vulnerability types

An attack starts when a Contrast agent detects an event from a specific IP address and ends once events stop for a specific period of time. If Contrast sees new events from the same IP address after an attack is considered “closed”, a new attack is created.

In Contrast, you can: