Ensure Ajax applications
Program Security is a new challenge for anyone who develops or manages Web Services. The core of most Ajax applications is the Javascript XMLHTTPRequest object, which allows web pages to independently connect to users' web servers and extract cross-origin content. When a service-oriented architecture is combined with other software services that are loosely integrated, this feature has serious security problems. Although Ajax does not create new security vulnerabilities
2017l 7th, 2012By tom in global security index, OWASP
This week I co-presented "smart bombs: Mobile vulnerability and exploitation" with John Sawyer and Kevin Johnson atowasp appsec DC. we talked about the some of the current problems facing mobile applications such as flaws found in the OWASP Mobile Top 10 and various privacy issues. we also talked about how you go about testing mobile applications fro
such as code: PHP code
$a = "";
$b = "
?>
$b?>
"#" >$a?>
This way the client is exposed to XSS attacks, and the workaround is to use the htmlencode,php function in the variable htmlentitiesphp code
$a = "";
$b = "
?>
$b)?>
"#" >$a)?>
Output HTML code in HTML properties
div id="div" name ="$var">div>
In this case the defense is also using HTMLEncodeImplemented in owasp
.
HTML entity encoding before inserting non-trusted data ... HTML entity encoding before inserting non-trusted data ... HTML entity encoding ...
[Coding Rules]So what exactly should HTML entity coding do? It needs to encode the following 6 special characters:–> amp;>–> gt;"–> quot;' –> #x27;/–> #x2f;There are two points that need to be specifically stated:
It is not recommended to encode single quotation marks (') as apos; Because it's not a standard HTML ta
, Webdriverserver triggers the browser's "native event" at the operating system level according to different commands.Simulates the operation of the browser. Webdriverserver returns the operation result HTTP response to the client for the code call.To see how this works more clearly and intuitively, let's take a look at using owasp Zap as an agent, intercepting HTTP request and response.Install owasp Zap or
This article by the code Farm-small peak original translation, reproduced please see the text at the end of the reprint requirements, welcome to participate in our paid contribution program!Java EE has some great built-in security mechanisms, but they are far from covering all the threats your application faces. Many common attacks, such as cross-site scripting attacks (XSS), SQL injection, cross-site forgery requests (CSRF), and XML external entities (XXE) are not covered in the slightest. You
Two important Web application security organizations-wasc/owaspWEB application Security Consortium (WASC)A.web development, collection and promotion of application safety standardsB,official Web site:www.webappsec.orgC.web Security Threat Classification Project (WEB Security vulnerability taxonomy)Open Web Application Security Project (OWASP)A. Working to identify and address the root causes of unsafe softwareB.official Web site:www.owasp.orgC.the
NoSQL Injection Analysis and relief, nosql injection relief
Key points of this article:
1. learn about new security vulnerabilities targeting NoSQL 2. five types of NoSQL attack methods, such as repeat, joint query, JavaScript injection, back-to-back query (Piggybacked queries), and cross-Origin Violation 3. OWASP organization's suggestions for checking NoSQL injection code 4. learn how to mitigate security risks 5. how to integrate NoSQL database vul
, the user will prompt repeated submission after refreshing!
1.9
Do not forget the accessibility of your website (accessibility, that is, how people with disabilities use your website ). For us websites, this is sometimes a legal requirement. WAI-ARIA has some good references in this regard.
Consider users with impaired vision! (Elderly, color blindness, etc)Consider Hearing Impaired Users! (Screen reader)
Ii. Security)
2.1
Read OWASP Development Guid
Vulnerability principleBasic learning is almost, first to learn the Web-related vulnerability principle, owasp Top 10 this to understand well, now has 2017 version, yes.【"OWASP Top 100 security hole candidates, what do you think?" -freebuf.com | Focus on hackers and Geeks http://www.freebuf.com/news/131778.html "Web Security Common Web Vulnerability-MOSHENGLV column-Blog channel-Csdn.net http://blog.csdn.n
increase their test methods and toolset to cope with Ajax applications.
In this article, the author introduces some of the security applications in AJAX technology. Intrusion testers are seeing that they already have the knowledge and tools to evaluate AJAX applications, but they are still a little hard to test. Later articles will focus on more aspects of the problem, such as helpful tools that can be used in AJAX security tests.
6. Reference
[Ref 1] Google suggest and Google Maps, two early A
process would have its own cache, I . E. APCU data is not shared between your worker processes. In this cases, you might want to consider using Redis instead, as it isn't tied to the PHP processes.
APCU are usually higher on stand-alone performance than Redis, but Redis provides more advanced data structures and more features
Note This prior to PHP 5.5, APC provides both an object cache and a bytecode cache. APCU is a project to bring APC's object cache to PHP 5.5+, since PHP now has a built-in
SQL injection vulnerabilities• Exploiting vulnerabilities through SQL injection• Discover the methods and tricks of SQL injection in your code• Exploit the vulnerabilities of the operating system• Defend against SQL injection attacks at the code layer and Platform layer• Determine if a SQL injection attack has been encounteredAbout the authorClark (Justin Clarke), co-founder and director of Gotham Digital Science, Gotham Digital Science is a security consulting firm that provides clients with s
, the 10 owasp rules apply and require routine security checks-such as authentication checks, input validation checks, dialog management checks, cryptographic checks, app checks, and injection testing. Some of the Web tools available for security testing are: HP webinspect and Web Proxy Editor, and there are few other tools that you can use to perform security testing. For a valid mobile test, the following may be an important test element: ?? emulato
accessibility testing. For example, the IPhone app can be tested with its embedded tools.For security testing, the 10 owasp rules apply and require routine security checks-such as authentication checks, input validation checks, dialog management checks, cryptographic checks, app checks, and injection testing. Some of the Web tools available for security testing are: HP webinspect and Web Proxy Editor, and there are few other tools that you can use to
accurately, and design and experience well.
9. performance and security
In terms of network Security, you need to pay attention to OWASP (Open Web Application Security Project), a non-profit organization. Its website is http://www.owasp.org /. The website provides a large amount of valuable information on security visibility.
In terms of performance, developers need to master some basic principles to ensure that efficient code can be provided at the
dynamic content in the context of Javascript, if dynamic content must be used, the development or code audit must consider the possible value of these dynamic content, whether it will lead to XSS attacks.Build PHP library function Check inputWeb developers must understand that it is not enough to build secure WEB applications only when the client uses JavaScript functions to detect and filter illegal inputs. As mentioned earlier, attackers can easily use tools to bypass JavaScript validation or
$ query2 ['username'];} else {echo "failed ";}
In the username field of the database
《script》while(1){alert();}《script》
I learned the content from the third article on this website for a long time.
I did not perform any processing and took it out directly from the database.《script》alert(123);《script》It will definitely be executed. I just tried.
Paste your code.
Htmlspecicalchars ()
OWasp https://www.owasp.org/index.php/PHP_Security_Cheat_She
PHP the right way-a quick guide to PHP best practices
PHP Best practices-A guide to php good practices
PHP weekly-a php Newsweek
PHP security-a PHP Security Guide
PHP fig-php Framework Interaction Group
PHP ug-A Web site that helps users locate the nearest PHP user group (UG)
Seven php-a member of the PHP community interviewed for the site
Nomad php-an online PHP Learning Resource
PHP mentoring-Point-to-point PHP Mentor Organization
Other Websites S
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.