Details

Innocent Code


Innocent Code

A Security Wake-Up Call for Web Programmers
1. Aufl.

von: Sverre H. Huseby

23,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 19.11.2004
ISBN/EAN: 9780470857472
Sprache: englisch
Anzahl Seiten: 246

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<ul> <li>This concise and practical book shows where code vulnerabilities lie-without delving into the specifics of each system architecture, programming or scripting language, or application-and how best to fix them</li> <li>Based on real-world situations taken from the author's experiences of tracking coding mistakes at major financial institutions</li> <li>Covers SQL injection attacks, cross-site scripting, data manipulation in order to bypass authorization, and other attacks that work because of missing pieces of code</li> <li>Shows developers how to change their mindset from Web site construction to Web site destruction in order to find dangerous code</li> </ul>
Foreword. <p>Acknowledgments.</p> <p>Introduction.</p> <p>I.1 The Rules.</p> <p>I.2 The Examples.</p> <p>I.3 The Chapters.</p> <p>I.4 What is Not in this Book?</p> <p>I.5 A Note From the Author.</p> <p>I.6 Feedback.</p> <p>1. The Basics.</p> <p>1.1 HTTP.</p> <p>1.2 Sessions.</p> <p>1.3 HTTPS.</p> <p>1.4 Summary.</p> <p>1.5 Do You Want to Know More?</p> <p>2. Passing Data to Subsystems.</p> <p>2.1 SQL Injection.</p> <p>2.2 Shell Command Injection.</p> <p>2.3 Talking to Programs Written in C/C++.</p> <p>2.4 The Evil Eval.</p> <p>2.5 Solving Metacharacter Problems.</p> <p>2.6 Summary.</p> <p>3. User Input.</p> <p>3.1 What is Input Anyway?</p> <p>3.2 Validating Input.</p> <p>3.3 Handling Invalid Input.</p> <p>3.4 The Dangers of Client-side Validation.</p> <p>3.5 Authorization Problems.</p> <p>3.6 Protecting Server-generated Input.</p> <p>3.7 Summary.</p> <p>4. Output Handling: The Cross-site Scripting Problem.</p> <p>4.1 Examples.</p> <p>4.2 The Problem.</p> <p>4.3 The Solution.</p> <p>4.4 Browser Character Sets.</p> <p>4.5 Summary.; 4.6 Do You Want to Know More?</p> <p>5. Web Trojans.</p> <p>5.1 Examples.</p> <p>5.2 The Problem.</p> <p>5.3 A Solution.</p> <p>5.4 Summary.</p> <p>6. Passwords and Other Secrets.</p> <p>6.1 Crypto-stuff.</p> <p>6.2 Password-based Authentication.</p> <p>6.3 Secret Identifiers.</p> <p>6.4 Secret Leakage.</p> <p>6.5 Availability of Server-side Code.</p> <p>6.6 Summary.</p> <p>6.7 Do You Want to Know More?</p> <p>7. Enemies of Secure Code.</p> <p>7.1 Ignorance.</p> <p>7.2 Mess.</p> <p>7.3 Deadlines.</p> <p>7.4 Salesmen.</p> <p>7.5 Closing Remarks.</p> <p>7.6 Do You Want to Know More?</p> <p>8. Summary of Rules for Secure Coding.</p> <p>Appendix A: Bugs in the Web Server.</p> <p>Appendix B: Packet Sniffing.</p> <p>Appendix C: Sending HTML Formatted E-mails with Forged Sender Address.</p> <p>Appendix D: More Information.</p> <p>Acronyms.</p> <p>References.</p> <p>Index.</p>
??the security book that all web developers need to read?sound advice?ignore at peril?? (Tech Book Report, January 2004) <p>"?achieves its aims admirably?" (PC Utilities, April 2004)</p> <p>??should be required reading for web developers?? (about.com, March 2004)</p> <p>??if you are a web techie you will love this book, I did?? (Infosecurity Today, July 04)</p>
Sverre Huseby runs his own company selling courses and consultancy services in Web application security. He's an active participant on webappsec mail forum.
This book is much more than a wake-up call. It is also an eye-opener. Even for those who are already awake to the problems of Web server security, it is a serious guide for what to do and what not to do, with many well-chosen examples. The set of fundamental rules is highly relevant. <p><i>Peter G. Neumann, Author of Computer-Related Risks,and moderator of the Internet Risks Forum (risks.org).</i></p> <p>This concise and practical book will show where code vulnerabilities lie and how best to fix them. Its value is in showing where code may be exploited to gain access to - or break - systems, but without delving into specific architectures, programming or scripting languages or applications. It provides illustrations with real code.</p> <p>Innocent Code is an entertaining read showing how to change your mindset from website <b><i>construction</i></b> to website <b><i>destruction</i></b> so as to avoid writing dangerous code. Abundant examples from susceptible sites will bring the material alive and help you to guard against:</p> <ul> <li> <div>SQL Injection, shell command i njection and other attacks based on mishandling meta-characters</div> </li> <li> <div>bad input</div> </li> <li> <div>cross-site scripting</div> </li> <li> <div>attackers who trick users into performing actions</div> </li> <li> <div>leakage of server-side secrets</div> </li> <li> <div>hidden enemies such as project deadlines, salesmen, messy code and tight budgets</div> </li> </ul> <p>All web programmers need to take precautions against producing websites vulnerable to malicious attack. This is the book which tells you how without trying to turn you into a security specialist.</p>

Diese Produkte könnten Sie auch interessieren:

Symbian OS Explained
Symbian OS Explained
von: Jo Stichbury
PDF ebook
32,99 €
Symbian OS Internals
Symbian OS Internals
von: Jane Sales
PDF ebook
56,99 €
Parallel Combinatorial Optimization
Parallel Combinatorial Optimization
von: El-Ghazali Talbi
PDF ebook
120,99 €