Leverages ASP.net's built-in capabilities to protect against web attacks

Source: Internet
Author: User
Tags session id sql injection

ASP.net developers should always adhere to the practice

If you are reading this article, you may not need to instill in you the fact that security in the Web application is becoming more and more important. What you need may be some practical advice on how to implement security in an ASP.net application. The bad news is that there is no development platform-including ASP. NET-to ensure that once the platform is adopted, you will be able to write code that is hundred percent secure. If anyone says so, paramilitary is lying. The good news is that, in the case of ASP.net, asp.net, especially version 1.1 and upcoming release 2.0, integrates some of the built-in defensive barriers that are easy to use.

Applying all of these features alone is not enough to protect WEB applications from any possible and predictable attack. However, if combined with other defensive techniques and security policies, the built-in ASP.net feature will make a powerful toolkit that helps ensure that applications run in a secure environment.

Web security is the sum of various factors, the result of a strategy that is far more than a single application, involving database management, network configuration, and social engineering and phishing.

The purpose of this article is to illustrate the practice that asp.net developers should always adhere to in order to maintain a reasonable level of safety standards. This is the most important aspect of security: stay vigilant and never completely relax, making it increasingly difficult for the bad guys to launch a hacker attack.

Let's look at what ASP.net offers to simplify the work.

Back to the top of the page

The source of the threat

In table 1, I summarize the most common types of web attacks and the flaws in the application that could lead to these attacks.

Possible initiators of attack attacks

Cross-site scripting (XSS)

echo back to the page's non-trusted user input

SQL Injection

Concatenates user input to form SQL commands

Session Hijacking

Session ID guessing and theft of conversation IDs cookies

One click

Undetected HTTP posting via script

hidden field Tampering

Unchecked (and trusted) hidden fields are populated with sensitive data

Table 1. Common web attacks

What are the key facts that appear in the list? In my opinion, at least the following three points:

• Whenever you insert any user input into your browser's markup, you potentially expose yourself to code injection attacks (any SQL injection and XSS variants).

• Database access must be implemented in a secure manner, that is, to use as few permissions as possible for the database and to divide the responsibilities of individual users through roles.

• Never send sensitive data over the network (let alone plaintext), and you must store sensitive data on the server in a secure manner.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.