473,404 Members | 2,179 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,404 software developers and data experts.

Web security

Well i am studying about web security. I have found some threats that developer should take care while coding.

1) Validate user input
2) SQL Injection
3) Cross -site scripting

I would like to ask that Are there other threats than the above mentioned?

If there then please tell me as i am preparing one document on web security and i would like to cover all the threats that one would face.
Aug 20 '08 #1
4 1208
dlite922
1,584 Expert 1GB
Well i am studying about web security. I have found some threats that developer should take care while coding.

1) Validate user input
2) SQL Injection
3) Cross -site scripting

I would like to ask that Are there other threats than the above mentioned?

If there then please tell me as i am preparing one document on web security and i would like to cover all the threats that one would face.

if you're refering to security in general, that's a whole ocean (see hacking)

as far as coding via a server-side language, such as PHP, you have the basics down. Those three are the major ones.

This may or may not fall under user input, but also there is session/cookie security If an application relies on it.

You could also add more security measures against brute force attacks. For example you could block someone's IP if they attempted to log in 20 times during 1 day and failed. Although the hacker can change his IP, this will cripple his brute force attack.

Another thing is have passwords be longer than 6 characters containing more than just plain characters but special characters and numbers as well.


Good luck on your paper,






Dan
Aug 20 '08 #2
if you're refering to security in general, that's a whole ocean (see hacking)

as far as coding via a server-side language, such as PHP, you have the basics down. Those three are the major ones.

This may or may not fall under user input, but also there is session/cookie security If an application relies on it.

You could also add more security measures against brute force attacks. For example you could block someone's IP if they attempted to log in 20 times during 1 day and failed. Although the hacker can change his IP, this will cripple his brute force attack.

Another thing is have passwords be longer than 6 characters containing more than just plain characters but special characters and numbers as well.


Good luck on your paper,






Dan
Thanks Dan for your quick reply.

My intention behind posting the thread is to discuss all the threats and get the views from all users. By doing this at the end of this thread we will come to know about all the threats.

I am increasing the list.
4) Session/cookie
5) Validation on password
6) lock the user account after the 3 unsuccessful attempts

I am looking forward to increase this list by getting views from you all.......
Aug 20 '08 #3
Atli
5,058 Expert 4TB
Hi.

The main thing when dealing with web-security is user input. And by that I mean everything from user <input> data to cookies, sessions, URLs, files, all the super-globals (like $_SERVER), etc.

Running any user input through eval() or one of the system functions should never be done, even if you have run it through strict validation. Even the most innocent looking string of data can be used to cause damage under the right circumstances.

Try to use SSL/TLS when dealing with sensitive data, like say user login info. It's almost easy to sniff out data from unencrypted requests.

Like Dan says, make sure users use proper passwords. I'd say at least 8 chars including upper and lower case letters, numbers and preferably special chars to.

Make sure to hash them into you databases using a proper hashing algorithm to. (That does not include MD5 btw!).
And make sure to "sand" your hashes. That is; appending a string to the password before hashing it to make them harder to decode if they are ever stolen.

Setting proper file permissions on all files is important to, in case somebody manages to force their way in through a FTP connection or something similar.
Try not to give PHP write access to files or directories. There are methods of injecting PHP code into your scripts, which could take advantage of this.

Can't think up anything more atm.
Good luck with your project! :)
Aug 20 '08 #4
You should include some examination of denial of service attacks. While a lot of those are network issues outside of the scope of what a software developer can or should deal with, there are ways that software issues can make you vulnerable to DoSing. For instance, if your web site allows a user to start a very resource-intensive process, and there's nothing to prevent them from performing more requests and starting more processes, performing a denial of service attack against your site may be as simple as hitting Reload repeatedly on the right page. Safeguards on resource-intensive processes can mitigate this risk.
Aug 20 '08 #5

Sign in to post your reply or Sign up for a free account.

Similar topics

2
by: robert | last post by:
well, talk about timely. i'm tasked to implement a security feature, and would rather do so in the database than the application code. the application is generally Oracle, but sometimes DB2. ...
116
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data...
4
by: Ashish | last post by:
Hi Guys I am getting the following error while implementing authentication using WS-security. "Microsoft.Web.Services2.Security.SecurityFault: The security token could not be authenticated...
0
by: prithvi g via .NET 247 | last post by:
Hi I am a newbie to .NET remoting, I am trying to implementauthorization using SSPI example provided by Michael Barnett. Ihave included the required dll(Microsoft.Samples.Security.SSPI.dll...
1
by: Earl Teigrob | last post by:
Background: When I create a ASP.NET control (User or custom), it often requires security to be set for certain functionality with the control. For example, a news release user control that is...
7
by: Magdelin | last post by:
Hi, My security team thinks allowing communication between the two IIS instances leads to severe security risks. Basically, we want to put our presentation tier on the perimeter network and the...
0
by: Jay C. | last post by:
Jay 3 Jan. 11:38 Optionen anzeigen Newsgroups: microsoft.public.dotnet.framework.webservices.enhancements Von: "Jay" <p.brunm...@nusurf.at> - Nachrichten dieses Autors suchen Datum: 3 Jan...
3
by: Velvet | last post by:
I ran FxCop on one of the components for my web site and the security rules what me to add " tags like the ones listed below: This breaks my ASP.NET application. So my question is,...
1
by: Jeremy S. | last post by:
..NET's code Access Security enables administrators to restrict the types of things that a .NET application can do on a local computer. For example, a ..NET Windows Forms application can be...
2
by: Budhi Saputra Prasetya | last post by:
Hi, I managed to create a Windows Form Control and put it on my ASP .NET page. I have done the suggestion that is provided by modifying the security settings. From the stack trace, I would...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.