Skip to content

Commit e90be15

Browse files
author
Arie Bregman
authored
Merge pull request iluwatar#61 from austinsonger/master
Updated README - Security
2 parents 4e05b9d + c130bd2 commit e90be15

File tree

1 file changed

+15
-0
lines changed

1 file changed

+15
-0
lines changed

README.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5243,10 +5243,20 @@ Authorization is the process of identifying what level of access the service or
52435243

52445244
<details>
52455245
<summary>What is XSS?</summary><br><b>
5246+
5247+
Cross Site Scripting (XSS) is an type of a attack when the attacker inserts browser executable code within a HTTP response. Now the injected attack is not stored in the web application, it will only affact the users who open the maliciously crafted link or third-party web page. A successful attack allows the attacker to access any cookies, session tokens, or other sensitive information retained by the browser and used with that site 
5248+
5249+
You can test by detecting user-defined variables and how to input them. This includes hidden or non-obvious inputs such as HTTP parameters, POST data, hidden form field values, and predefined radio or selection values. You then analyze each found vector to see if their are potential vulnerabilities, then when found you craft input data with each input vector. Then you test the crafted input and see if it works.
5250+
52465251
</b></details>
52475252

52485253
<details>
52495254
<summary>What is an SQL injection? How to manage it?</summary><br><b>
5255+
5256+
SQL injection is an attack consists of inserts either a partial or full SQL query through data input from the browser to the web application. When a successful SQL injection happens it will allow the attacker to read sensitive information stored on the database for the web application. 
5257+
5258+
You can test by using a stored procedure, so the application must be sanitize the user input to get rid of the tisk of code injection. If not then the user could enter bad SQL, that will then be executed within the procedure
5259+
52505260
</b></details>
52515261

52525262
<details>
@@ -5331,6 +5341,11 @@ Authorization is the process of identifying what level of access the service or
53315341

53325342
<details>
53335343
<summary>What is CSRF? How to handle CSRF?</summary><br><b>
5344+
5345+
Cross-Site Request Forgery (CSRF) is an attack that makes the end user to initate a unwanted action on the web application in which the user has a authenticated session, the attacker may user an email and force the end user to click on the link and that then execute malicious actions. When an CSRF attack is successful it will compromise the end user data 
5346+
5347+
You can use OWASP ZAP to analyze a "request", and if it appears that there no protection against cross-site request forgery when the Security Level is set to 0 (the value of csrf-token is SecurityIsDisabled.) One can use data from this request to prepare a CSRF attack by using OWASP ZAP
5348+
53345349
</b></details>
53355350

53365351
<details>

0 commit comments

Comments
 (0)