13 Protecting your application against external attacks
This chapter covers
- Configuring your application for HTTPS
- Ensuring you apply good access control
- Avoiding common cryptographic failures
- Preventing injection attacks
Once your application is published, it will come under attack. Most of these attacks will be automated, probing for well-known vulnerabilities. You will probably be surprised to see requests being logged for URLs that include phpmyadmin, or the names of popular third-party component libraries you don’t even use. The HTTPS protocol underpins the security of any website. We will begin this chapter with a reminder of the importance of HTTPS and learning how to configure your application to use HTTPS.
Then we will look at the ...
Get ASP.NET Core Razor Pages in Action now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.