The document did last year, supposedly should be updated, not well written, some did not write the whole, referring to a lot of documents.
Say Owasp Codereview, also should out 2.0.
The cows were passing by, giving some advice.
Directory
1. Overview 3
2. Input verification and output display 3
2.1 Command Injection 42.2 Cross-Site Scripting 42.3 file contains 52.4 Code Injection 52.5 SQL Injection 62.6 XPath Injection 62.7 HTTP response Split 6
PHP website
?? Helpful Web sites related to PHPPHP the right-direction: A quick reference guide to PHP PracticeBest Practice Guide for PHP practices:phpPHP Weekly: A php NewsweekPHP security:php Security GuidancePHP fig:php Framework Interaction GroupPHP UG: A website that helps people locate the most recent PHP user groupSeven PHP: A website that interviews PHP community usersNomad php: Online PHP Learning ResourcesPHP Mentoring: Point-to-point PHP guidance Organization
Other websites
?? Use
Recently, the project was launched. A third-party company was invited to perform a penetration test and multiple XSS attacks were detected. Because we have used URLFilter to filter special characters for URL Get requests, the Get request vulnerability has been blocked. However, for Post requests, considering the existence of form submission in our project, rich text editing and other functions, dare not rashly use Filter to Filter keywords.To solve the above problem, we adopted AntiSamy, an open
This topic is the content we shared in the OWASP Hangzhou region security salon at the end of 2013. Here we resummarized the overall content of this topic and formed a text version.
In this article, the case and response experience of DDoS come from the actual scenarios of a customer service system with a high market share, we analyze the costs, efficiency, and specific architecture design (selection, configuration, and optimization) to cope with diff
How to Prevent SQL Injection in PHP applications
SQL injection is a technology used to control database queries, which often results in loss of confidentiality. In some cases
SELECT'
Attackers can take down the server, and code injection (including SQL, LDAP, operating system commands, and XPath injection technology) remains in the top 10 of OWASP vulnerabilities for many years.
More people share their knowledge about application security. Unfortuna
and they will also make security mistakes. This idea helps developers avoid or reduce security risks and avoid losses to the company.
Everyone will make mistakes. If the developer finds the problem before the hacker finds the vulnerability, the problem is not big. When developers and Software testers test and audit Web applications, or before the enterprise is put into use, developers or testers may use the well-known open-source tool owasp zap to sc
1Test Environment Introduction1. Use burpsuit tools for brute force2, the test environment for the DVWA module in the OWASP environment2Test Steps2.1Set Browser proxyRun First Burpsuit Tool, set the listening address and port, then set the proxy IP and address in the browser . such as:650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M02/8A/DC/wKiom1g9V9vRzWDoAABOVmV3FQw454.png "style=" float: none; "title=" 1.png "alt=" Wkiom1g9v9vrzwdoaabovmv3f
activity. capture a normal request packet first, remove the Referer field, and submit again. If it is still valid, there is basically a problem. Of course, the number of parts may contain the number of parts that cannot be preemptible (for example, userid or something). At this time, it depends on whether the number of parts that cannot be preemptible can be obtained through other means, such as flash. If yes, the problem persists. Also, try to change post to get, because some programs do not d
packet, remove the referer field, and submit the packet again. If it is still valid, there is basically a problem. Of course, the parameter may contain unpredictable parameters (such as userid or something). At this time, it depends on whether this unpredictable parameter can be obtained through other means, such as flash. If yes, the problem still exists. Also, try to change post to get, because some programs do not distinguish get/post.The functions and return forms of applications are differ
unfriendly error prompts.
1.5 do not directly display the user's email address, or at least do not display it in plain text.
1.6 set reasonable limits for your website. Once the threshold value is exceeded, the service will automatically stop. (This is also related to website security .)
1.7 know how to implement progressive enhancement of web pages (progressive enhancement ).
1.8 After a POST request is sent, the user always redirects it to another webpage.
1.9 Do not forget the accessibility
Understand XSS attack principles
After reading the HTML security list written by cool shell
I suddenly wanted to write a quick tutorial on XSS.
Let more people know what XSS security vulnerabilities are
Before understanding XSS, you must know the principle of "session ".
Simply put, after a member successfully logs in, the website will give the browser a "token 』
After this token is taken to the website, it will be considered as logged on
Next is the simplest process of XSS.
authentication error information may cause dictionary attacks or brute-force cracking. Therefore, we should give a common error message as much as possible.
In addition, to prevent brute-force attacks, we can set the following rules:
-The first Logon Failed. The next logon interval is at least 5 s.
-The second Logon Failed. The next logon interval is at least 15 s.
-The third logon fails. The next logon interval is at least 45 s.
-The fourth Logon Failed. The graphic Verification Code CAPTCHA i
Software Security Testing is the most important way to ensure the security of software. How to conduct efficient security testing has become a topic of attention in the industry. Years of security testing experienceWe are advised that the necessary conditions for doing a good job in software security testing are: first, fully understanding software security vulnerabilities, and second, having efficient software security testing technologies and testing tools.
I. Analysis of major security vulne
circumstances it's a legal requirement. WAI-ARIA and WCAG 2 are good resources in this area.
Don't make me think
Security
It's a lot to digest but the OWASP development guide covers Web Site security from top to bottom.
Know about Injection especially SQL injection and how to prevent it.
Never trust user input, nor anything else that comes in the request (which has des cookies and hidden form field values !).
Hash passwords using salt and use
Paip. Improved security-360, WI, awvsProgramSecurity detection software usage Summary
Author attilax, 1466519819@qq.comMy website first detected it online on the 360 website and said I had 98 points. No vulnerability ..
Then acunetix web Vulnerability 7 was used to discover two SQL Injection Vulnerabilities ..
Then webinspect 9.20 was used to discover two SQL Injection Vulnerabilities, two XSS vulnerabilities, and three unencrypted login forms, with a total of seven high-risk vulnerabilities
Statement in advance: I just talked about how to use this component.
In another important XX period (I hope this article will help my colleagues who are facing this need), a web application is facing security reinforcement Requirements for the first time, and the appscan Security Test Report is refreshing, the content is comprehensive, and the prompt is recommended, and it is noon. Of course, some Chinese are obviously useless.
Previously, the back-end architecture of this application was re
Name: XSS
All-life: Cross-Site Scripting
Why not CSS? Since CSS has been widely used in the field of web design as Cascading Style Sheets, cross is abbreviated as X with similar pronunciation.
Jianghu ranking: 2013 OWASP (Open Web Application Security Project, the official website of https://www.owasp.org/) ranked third.
Summary: cross-site scripting (XSS) is a website application.ProgramIsCodeInjection. It allows malicious users to inje
1. CauseImproper authentication and session management methods.Including logout, password management, timeout mechanism, remembering users, password problems, and account updates.2. HazardsThe account is stolen and attackers can have all the permissions of the account. Privileged accounts are often attacked.3. Discovery(1) An insecure hash or encryption algorithm is used to store passwords.(2) Use the weak account management function to guess or overwrite the user password (Account creation, pas
an exploit library, which can be used for your reference.
The above mentioned is for the system. In terms of web, the injection tools include nbsi, OWASP sqlix, and SQL power injector,Sqldumper, sqlninja, sqlmap, sqlbftools, priamos, ISR-sqlget *** and so on.
Database-oriented tools include:Database tool listOracle THC-orakelMs SQL ServerMySQLDB2This part is worth mentioning that many penetration testing teams have their own testing tools and even 0d
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.