Web application security¶
Web application security is a branch of Information Security that arrangements particularly with the security of sites, web applications, and web administrations. At an abnormal state, Web application security draws on the standards of application security, however, applies them particularly to Internet and Web frameworks
A PC risk is a probability of threat that may hurt the helplessness of a PC framework and rupture the security to cause harm. It can have a purposeful reason like hacking or an incidental reason for the catastrophic event or PC glitch.
Types of Security Threats¶
The most well-known computer threat virus works by inserting itself into an application and destroying users data and alters the way the application works without the permission of user.
Hackers and Predator¶
It is people not computers who create threats. A computer hacker is any skilled computer expert who uses their knowledge to overcome a problem. The term hacker may refer to anyone with technical skills but is often refers to a person who uses his or her abilities to gain unauthorized access to systems or networks in order to commit crimes.
The Open Web Application Security Project (OWASP) is a worldwide not-for-profit charitable organization focused on improving the security of software. According to OWASP the top vulnerabilities in 2017 include
Top 10 vulnerabilities¶
- Broken Authentication and Session Management
- Sensitive Data Exposure
- XML External Entity
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting
- Insecure deserialization
- Using Components With Known Vulnerabilities
- Insufficient Logging and Monitoring
Injection is a category that includes all kinds of vulnerabilities where an application sends queries to the application which lead to some untrusted access or something else. It is often found in database queries, but other examples are OS commands, XML parsers or when user input is sent as program arguments.
Broken Authetiacation and Session Management¶
Broken Authentication involves all kinds of flaws that are caused by an error in implementations of authentication and/or session management. This category includes some time-based login errors , or if any user forgets to log out from his account when he was logged in any public places such that his account could be hijacked. And sometime this could be also due to some session
Sensitive Data Exposure¶
This occurs when the application is not given the adequate protection to the sensitive data. The data can be anything from passwords, session tokens, credit card data to private health data and more can be exposed.
XML External Entity¶
XXE allows attackers to abuse external entities when an XML document is parsed. If this happens, the attacker can read local files on the server, force the parser to make network requests within the local network, or use recursive linking to perform a DoS attack.
Broken Access Control¶
Broken Access Control is vulnerability category that covers all access control issues that can make your website vulnerable and can often be found in web applications that have gradually grown in size without any of proper limitation and some access security. The category is the result of merging Insecure Direct Object References and Missing Function level.
Security misconfiguration is a very common vulnerability category that occurs when a component is susceptible to attack due to an insecure configuration. At worst, exploiting a security misconfiguration can lead to a full takeover.
Insecure Deserialization allows attackers to transfer a payload using serialized objects. This happens when integrity ch ecks are not in place and deserialized data is not sanitized or validated.
Using Components With Know Vulnerability¶
It is very common for web services to include a component with a known security vulnerability. The component with a known vulnerability could be the operating system itself, or some internal issues with the system or even a library used by one of these plugins, making this a very frequent finding.
Insufficient Logging and Monitoring¶
Insufficient Logging and Monitoring covers the lack of best practices that should be in place to prevent or damage control security breaches. The category includes everything from unlogged events, logs that are not stored properly and warnings where no action is taken within a reasonable time.
So for all these we need some high standards of coding and some stuff which we will use for the client side some of them are
- JAVA SCRIPT
Server Side languages :
- JAVA SCRIPT
And in between these play some key role between the server and the client some of them are:
- HTTP Headers
- HTTP Request
- HTTP Respond
And in http there are some types of methods some of them are :
So for every process, you do you will have some particular code like some number, for example 200 will be the response of the web in the case of the successful request
Some of them given in the following:
- 2xx - OK (success)
- 3xx - redirection(eg 302 moved temporarily)
- 4xx - client side error(eg 401 unauthorized)
- 5xx - server side error(eg 500 Internal Server Error )
|Compared URL||Out Come||Reason|
|http://www.example.com/dir/page.html||SUCCESS||Same Protocol and Host|
|http://www.example.com/dir2/someother.html||SUCCESS||Same Protocol and Host|
|http://www.example.com81/dir/someother.html||FAILURE||Same protocol and host but difference port|
|http://example.com81/dir/someother.html||FAILURE||Different host(exact match is required )|
|http://V2.example.com/dir/page.html||FAILURE||Different host(exact match is required )|