O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Web Security: Common Vulnerabilities And Their Mitigation

Video Description

A guide to dealing with XSS, session hijacking, XSRF, credential management, SQLi and a whole lot more

About This Video

  • Security attacks such as Cross Site Scripting, Session Hijacking, Credential Management, Cross Site Request Forgery, SQL Injection, Direct Object Reference, Social Engineering
  • Risk mitigation using the Content Security Policy Header, user input validation and sanitization, secure token validation, sandboxed iframes, secure sessions and expiry, password recovery
  • Web security basics: Two factor authentication, Open Web Application Security Project,

In Detail

Coat your website with armor, protect yourself against the most common threats and vulnerabilities. Understand, with examples, how common security attacks work and how to mitigate them. Learn secure practices to keep your website users safe. Let's parse that. How do common security attacks work?: This course walks you through an entire range of web application security attacks, XSS, XSRF, Session Hijacking, Direct Object Reference and a whole lot more. How do we mitigate them?: Mitigating security risks is a web developer's core job. Learn by example how you can prevent script injection, use secure tokens to mitigate XSRF, manage sessions and cookies, sanitize and validate input, manage credentials safely using hashing and encryption etc. What secure practices to follow?: See what modern browsers have to offer for protection and risk mitigation, how you can limit the surface area you expose in your site.

Table of Contents

  1. Chapter 1 : You, This Course and Us
    1. You, This Course and Us 00:01:49
  2. Chapter 2 : What Is Security?
    1. Security and its building blocks 00:13:41
    2. Security related definitions and categories 00:10:13
  3. Chapter 3 : Cross Site Scripting
    1. What is XSS? 00:12:59
    2. Learn by example - how does a XSS attack work? 00:13:06
    3. Types of XSS 00:12:59
    4. XSS mitigation and prevention 00:11:16
  4. Chapter 4 : User Input Sanitization And Validation
    1. Sanitizing input 00:12:09
    2. Sanitizing input - still not done 00:08:10
    3. Validating input 00:14:07
    4. Validating input - some more stuff to say 00:09:17
    5. Client Side Encoding, Blacklisting and Whitelisting inputs 00:07:03
  5. Chapter 5 : The Content Security Policy Header
    1. Rules for the browser 00:11:23
    2. Default directives and wildcards 00:08:40
    3. Stay away from inline code and the eval() function 00:08:13
    4. The nonce attribute and the script hash 00:11:27
  6. Chapter 6 : Credentials Management
    1. Broken authentication and session management 00:03:05
    2. All about passwords - Strength, Use and Transit 00:05:24
    3. All about passwords – Storage 00:13:17
    4. Learn by example - login authentication 00:10:29
    5. A little bit about hashing 00:10:34
    6. All about passwords – Recovery 00:14:26
  7. Chapter 7 : Session Management
    1. What is a session? 00:06:22
    2. Anatomy of a session attack 00:06:35
    3. Session hijacking - count the ways 00:04:53
    4. Learn by example - sessions without cookies 00:14:40
    5. Session ids using hidden form fields and cookies 00:04:08
    6. Session hijacking using session fixation 00:08:09
    7. Session hijacking counter measures 00:03:59
    8. Session hijacking - sidejacking, XSS and malware 00:03:11
  8. Chapter 8 : SQL Injection
    1. Who Is Bobby Tables? 00:05:17
    2. Learn by example - how does SQLi work? 00:09:27
    3. Anatomy of a SQLi attack - unsanitized input and server errors 00:08:42
    4. Anatomy of a SQLi attack - table names and column names 00:06:19
    5. Anatomy of a SQLi attack - getting valid credentials for the site 00:05:23
    6. Types of SQL injection 00:08:09
    7. SQLi mitigation - parameterized queries and stored procedures 00:07:47
    8. SQLi mitigation - Escaping user input, least privilege, whitelist validation 00:06:33
  9. Chapter 9 : Cross Site Request Forgery
    1. What is XSRF? 00:10:01
    2. Learn by example - XSRF with GET and POST parameters 00:07:25
    3. XSRF mitigation - The referer, origin header and the challenge response 00:05:47
    4. XSRF mitigation - The synchronizer token 00:09:14
  10. Chapter 10 : Lot's Of Interesting Bits Of Information
    1. The Open Web Application Security Project 00:08:11
    2. 2 factor authentications and OTPs 00:11:05
    3. Social Engineering 00:09:01
  11. Chapter 11 : Direct Object Reference
    1. The direct object reference attack - do not leak implementation details 00:09:20
    2. Direct object reference mitigations 00:04:56
  12. Chapter 12 : Iframes
    1. IFrames come with their own security concerns 00:06:46
    2. Sandboxing iframes 00:09:02
  13. Chapter 13 : One last word
    1. Wrapping up the OWASP top 10 list 00:07:42
  14. Chapter 14 : One last word
    1. Installing PHP (Windows) 00:09:45
    2. Enabling MySQL and using phpmyadmin (Windows) 00:03:05
    3. Installing PHP (Mac) 00:11:55
    4. Installing MySQL (Mac) 00:07:04
    5. Using MySQL Workbench (Mac) 00:17:32
    6. Getting PHP and MySQL to talk to each other (Mac) 00:01:06