11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents xxxiASP.NET Architecture on Windows Server 2003 ........................................................ 592Configuring ACLs for Network Service ................................................................... 593Isolating <strong>Application</strong>s by Identity .............................................................................. 594Anonymous Account Impersonation ...................................................................... 595Fixed Identity Impersonation ................................................................................ 597Isolating <strong>Application</strong>s with <strong>Application</strong> Pools ............................................................. 599Isolating <strong>Application</strong>s with Code Access <strong>Security</strong> ....................................................... 600Forms Authentication Issues.................................................................................... 601UNC Share Hosting ................................................................................................. 601Summary ............................................................................................................... 602Part VAssessing Your <strong>Security</strong> 603Chapter 21Code Review 605In This Chapter ....................................................................................................... 605Overview ................................................................................................................ 605FxCop .................................................................................................................... 606Performing Text Searches ........................................................................................ 606Search for Hard-Coded Strings ............................................................................. 606ILDASM.............................................................................................................. 607Cross-Site Scripting (XSS)........................................................................................ 608Identify Code That Outputs Input .......................................................................... 609Identify Potentially Dangerous HTML Tags <strong>and</strong> Attributes........................................ 610Identify Code That H<strong>and</strong>les URLs ......................................................................... 611Check That Output Is Encoded ............................................................................. 612Check for Correct Character Encoding................................................................... 612Check the validateRequest Attribute..................................................................... 612Check the HttpOnly Cookie Option........................................................................ 613Check the <strong>Security</strong> Attribute ................................................................... 613Check the Use of the innerText <strong>and</strong> innerHTML Properties...................................... 613More Information ................................................................................................ 613SQL Injection .......................................................................................................... 614Buffer Overflows ..................................................................................................... 615Managed Code ....................................................................................................... 616Is Your Class Design Secure? .............................................................................. 617Do You Create Threads? ...................................................................................... 617Do You Use Serialization?.................................................................................... 618Do You Use Reflection? ....................................................................................... 619Do You H<strong>and</strong>le Exceptions? ................................................................................. 619Do You Use Cryptography?................................................................................... 620Do You Store Secrets? ........................................................................................ 621Do You Use Delegates?....................................................................................... 622

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!