Web Security Test
Lecture 3
Layer of software that sits on hardware
Kernel -> keeps ram and disk protected from public
Kernel is monolithic
It performs low level operations
Rings
For example ring 0 has the highest priority
They represent security boundaries
Unix
Multiple users can use a system
Shared computing resources
Central server
Web applications are multi user systems
Linux
Host firewall
Restrict access of public to ports
Permit traffic on an app to app basis
Virtualization
A compartmentalized application running on a
server
VMWARE, DOCKER ETC
ls -l
Shows a list of stuff and
who can access them
read, write and when it
was last modified etc
Sets of characters
showing who can read
and write by 3
Cloud Service Providers
Less managing servers
AWS is known for
BucketLeaks being a
security risk
Reducing the surface area of
potential vulnerabilities
Huge software- more security
risks
A small bug can help hackers
find big bugs
Baseline
The set of minimum security controls defined for a low-impact, moderate-impact, or high-impact information
system.
Lecture 4
Same origin policy
Same origin policy
Making sure other sites you travel to cannot get your information
Protecting application origin from being known
Cookies follow same origin policy
Cookies allow web servers to have a bit of data and
the cookie sends info back to the origin which they
were set on
SAME ORIGIN POLICY DOES NOT COMPLETELY
APPLY TO THEM
Cookies manage sessions
Mobile apps don’t use cookies
CSRF
Taking advantage of the default trust with
cookies
Identifying sensitive action a user can take
Form request will do a post request
including the request of the cookie of the
user
Exploits the trust of browsers to certain
origins
Luring the user to come to our site so they
give us their origin and cookies
Anti CSRF Token
ASP.Net has this enabled by
default
HTTP only means the javascript will not show the value of
the cookie
Referer header validation
HTTP header
Automatically included in request
Includes origin you are coming from
It can most likely be trusted
All browsers set a default value for this
Supply Chain Attack
Supply Chain Attack
A github repository for example could
be a vulnerability because a hacker
may modify the code
Not vetting source scripts = bad
Test 2
Crypto Flashcards | Quizlet
Web Security Flashcards | Quizlet

Beginner: Types of Operating Systems and Attacks in Web Security

  • 1.
  • 2.
    Lecture 3 Layer ofsoftware that sits on hardware Kernel -> keeps ram and disk protected from public Kernel is monolithic It performs low level operations Rings For example ring 0 has the highest priority They represent security boundaries
  • 3.
    Unix Multiple users canuse a system Shared computing resources Central server Web applications are multi user systems
  • 4.
    Linux Host firewall Restrict accessof public to ports Permit traffic on an app to app basis Virtualization A compartmentalized application running on a server VMWARE, DOCKER ETC ls -l Shows a list of stuff and who can access them read, write and when it was last modified etc Sets of characters showing who can read and write by 3
  • 5.
    Cloud Service Providers Lessmanaging servers AWS is known for BucketLeaks being a security risk
  • 6.
    Reducing the surfacearea of potential vulnerabilities Huge software- more security risks A small bug can help hackers find big bugs
  • 7.
    Baseline The set ofminimum security controls defined for a low-impact, moderate-impact, or high-impact information system.
  • 8.
  • 9.
  • 10.
    Same origin policy Makingsure other sites you travel to cannot get your information Protecting application origin from being known Cookies follow same origin policy Cookies allow web servers to have a bit of data and the cookie sends info back to the origin which they were set on SAME ORIGIN POLICY DOES NOT COMPLETELY APPLY TO THEM Cookies manage sessions Mobile apps don’t use cookies
  • 11.
    CSRF Taking advantage ofthe default trust with cookies Identifying sensitive action a user can take Form request will do a post request including the request of the cookie of the user Exploits the trust of browsers to certain origins Luring the user to come to our site so they give us their origin and cookies
  • 12.
    Anti CSRF Token ASP.Nethas this enabled by default HTTP only means the javascript will not show the value of the cookie
  • 13.
    Referer header validation HTTPheader Automatically included in request Includes origin you are coming from It can most likely be trusted All browsers set a default value for this
  • 14.
  • 15.
    Supply Chain Attack Agithub repository for example could be a vulnerability because a hacker may modify the code Not vetting source scripts = bad
  • 16.
    Test 2 Crypto Flashcards| Quizlet Web Security Flashcards | Quizlet