February 2019
Intermediate to advanced
256 pages
7h 34m
English
The following table lists common keywords and patterns for secure code review:
|
Programming language |
Risky API or the insecure code patterns |
False positive |
|
|
General |
Weak encryption |
Blowfish | DES | 3DES | RC4 | MD5 | SHA1 | XOR | ARC4 | IDEA | ECB | CBC | TLS 1.0 | SSL 2.0 | Base64 | RIPEMD |
Low |
|
Insecure protocol |
SSL | HTTP | FTP | Telnet |
Low |
|
|
Hard-coded info. |
Password | IP address | Email | Special Hotkey | URL | Mobile Number | Name |
High |
|
|
C/C++ |
Command injection |
execl|execlp|execle|system|popen|WinExec|ShellExecute | execv|execvp| |
Med |
|
Buffer overflow |
fscanf|sscanf|vsscanf|vfscanf | scanf|vscanf|wscanf| sprintf|vsprintf|swprintf|vswprintf| ... | ||
Read now
Unlock full access