Web Security: Common Vulnerabilities And Their Mitigation

Video description

A guide to dealing with XSS, session hijacking, XSRF, credential management, SQLi and a whole lot more

About This Video

  • Security attacks such as Cross Site Scripting, Session Hijacking, Credential Management, Cross Site Request Forgery, SQL Injection, Direct Object Reference, Social Engineering
  • Risk mitigation using the Content Security Policy Header, user input validation and sanitization, secure token validation, sandboxed iframes, secure sessions and expiry, password recovery
  • Web security basics: Two factor authentication, Open Web Application Security Project,

In Detail

Coat your website with armor, protect yourself against the most common threats and vulnerabilities. Understand, with examples, how common security attacks work and how to mitigate them. Learn secure practices to keep your website users safe. Let's parse that. How do common security attacks work?: This course walks you through an entire range of web application security attacks, XSS, XSRF, Session Hijacking, Direct Object Reference and a whole lot more. How do we mitigate them?: Mitigating security risks is a web developer's core job. Learn by example how you can prevent script injection, use secure tokens to mitigate XSRF, manage sessions and cookies, sanitize and validate input, manage credentials safely using hashing and encryption etc. What secure practices to follow?: See what modern browsers have to offer for protection and risk mitigation, how you can limit the surface area you expose in your site.

Audience

The following audience will benefit from this course: - Students who have some experience in web programming and understand basic browser concepts, students who are beginners and have never done any web programming.

Publisher resources

Download Example Code

Table of contents

  1. Chapter 1 : You, This Course and Us
    1. You, This Course and Us
  2. Chapter 2 : What Is Security?
    1. Security and its building blocks
    2. Security related definitions and categories
  3. Chapter 3 : Cross Site Scripting
    1. What is XSS?
    2. Learn by example - how does a XSS attack work?
    3. Types of XSS
    4. XSS mitigation and prevention
  4. Chapter 4 : User Input Sanitization And Validation
    1. Sanitizing input
    2. Sanitizing input - still not done
    3. Validating input
    4. Validating input - some more stuff to say
    5. Client Side Encoding, Blacklisting and Whitelisting inputs
  5. Chapter 5 : The Content Security Policy Header
    1. Rules for the browser
    2. Default directives and wildcards
    3. Stay away from inline code and the eval() function
    4. The nonce attribute and the script hash
  6. Chapter 6 : Credentials Management
    1. Broken authentication and session management
    2. All about passwords - Strength, Use and Transit
    3. All about passwords – Storage
    4. Learn by example - login authentication
    5. A little bit about hashing
    6. All about passwords – Recovery
  7. Chapter 7 : Session Management
    1. What is a session?
    2. Anatomy of a session attack
    3. Session hijacking - count the ways
    4. Learn by example - sessions without cookies
    5. Session ids using hidden form fields and cookies
    6. Session hijacking using session fixation
    7. Session hijacking counter measures
    8. Session hijacking - sidejacking, XSS and malware
  8. Chapter 8 : SQL Injection
    1. Who Is Bobby Tables?
    2. Learn by example - how does SQLi work?
    3. Anatomy of a SQLi attack - unsanitized input and server errors
    4. Anatomy of a SQLi attack - table names and column names
    5. Anatomy of a SQLi attack - getting valid credentials for the site
    6. Types of SQL injection
    7. SQLi mitigation - parameterized queries and stored procedures
    8. SQLi mitigation - Escaping user input, least privilege, whitelist validation
  9. Chapter 9 : Cross Site Request Forgery
    1. What is XSRF?
    2. Learn by example - XSRF with GET and POST parameters
    3. XSRF mitigation - The referer, origin header and the challenge response
    4. XSRF mitigation - The synchronizer token
  10. Chapter 10 : Lot's Of Interesting Bits Of Information
    1. The Open Web Application Security Project
    2. 2 factor authentications and OTPs
    3. Social Engineering
  11. Chapter 11 : Direct Object Reference
    1. The direct object reference attack - do not leak implementation details
    2. Direct object reference mitigations
  12. Chapter 12 : Iframes
    1. IFrames come with their own security concerns
    2. Sandboxing iframes
  13. Chapter 13 : One last word
    1. Wrapping up the OWASP top 10 list
  14. Chapter 14 : One last word
    1. Installing PHP (Windows)
    2. Enabling MySQL and using phpmyadmin (Windows)
    3. Installing PHP (Mac)
    4. Installing MySQL (Mac)
    5. Using MySQL Workbench (Mac)
    6. Getting PHP and MySQL to talk to each other (Mac)

Product information

  • Title: Web Security: Common Vulnerabilities And Their Mitigation
  • Author(s): Loonycorn
  • Release date: October 2017
  • Publisher(s): Packt Publishing
  • ISBN: 9781788835077