Security
SUMMARY MAIN NOTES
There are different Contents
type of web Web Application Security
security attacks: Types of attacks
General recommendations
Spoofing Storing passwords
Tampering Salting
Injection Attacks
Repudiation SQL Injection
Information HTTP Header Injection
Log Injection
disclosure
JavaScript Injection (XSS)
Denial of Preventing attacks
Service Cookie httponly
Input Sanitisation
Elevation of
HTML Escaping
Privilege
XSS Protection
Passwords must Cross-Origin Resource Sharing
be stored, but Same-origin Policy
vulnerable to Cross-Origin Resource Sharing
dictionary attacks Cross-Site Request Forgery
CSRF Protection
so adding salting
Session Hijacking
makes them hard
Secure Transmission (HTTPS)
to decrypt
Injection attacks
consist of Web Application Security
attackers placing Hackers aim to access users’ information and
malicious code control of systems:
where the
collecting information about you or your system
application is
expecting normal access personal data for ID theft
data
Commit user transaction fraud
Security 1
, SQL Injection Use your system for more complex attacks
HTTP Headers
in response Types of attacks
Log injection Spoofing: impersonate another user
JavaScript Tampering: change or delete without
Injection (XSS) authorisation
Session hijacking, Repudiation: user actions not logged
when the attacker Information disclosure: steal or reveal server
has the same info
session ID as user,
Denial of Service (DoS): make app less available
server cannot
distinguish Elevation of Privilege: gain admin privileges
General recommendations
Use a firewall
Install latest security patches
Backup often and keep backup safe
Keep web server computer physically secure
Secure server computers with strong password
Close unused ports, turn off unused services
Virus checker to monitor inbound and outbound
traffic
Storing passwords
‼️ Never store passwords in plain text: hash
them
When using hash functions, if two users have the
same password they will have the same hash, which
can be discovered using a dictionary attack. This
still makes the system vulnerable
Security 2