Skip to content

Commit

Permalink
optimized some text lengths and layouts
Browse files Browse the repository at this point in the history
  • Loading branch information
bkimminich committed Nov 4, 2014
1 parent 7736de3 commit 78cfa54
Showing 1 changed file with 22 additions and 14 deletions.
36 changes: 22 additions & 14 deletions index.html
Original file line number Diff line number Diff line change
Expand Up @@ -226,9 +226,9 @@ <h3>XSS Attack Examples</h3>
<section>
<h3>Preventing XSS</h3>
<ul>
<li>Do not unnecessarily include user supplied input into your output</li>
<li>Do not unnecessarily include user supplied input into output</li>
<li>Output encode <strong>all</strong> user supplied input</li>
<li>Sanitize HTML where user supplied HTML chunks are unavoidable</li>
<li>Sanitize HTML where user supplied HTML is unavoidable</li>
<li>White List Input Validation</li>
</ul>
</section>
Expand Down Expand Up @@ -262,14 +262,15 @@ <h3>CSRF Attack Examples</h3>
<section>
<h3>Preventing CSRF</h3>
<ul>
<li>Add a secret <em>not automatically submitted</em> token to all sensitive requests</li>
<li>Add a secret token to all sensitive requests</li>
<li>This token must not be automatically submitted</li>
<li>Require secondary authentication for sensitive functions</li>
<li>Beware exposing the token in a referer header</li>
<hr>
<p>
Make sure your application has no XSS holes that could be exploited to attack others!
</p>
<li>Beware exposing the token in a <code>Referer</code> HTTP header</li>
</ul>
<hr>
<p>
Make sure your application has no XSS holes that could be exploited to attack others!
</p>
</section>
</section>

Expand All @@ -281,9 +282,9 @@ <h2>Broken Authentication</h2>
<h3>Typical Authentication Flaws</h3>
<ul>
<li>Allowing weak passwords</li>
<li>Credentials passed via insecure <code>http</code> connection</li>
<li>Expose user session id's in URLs, unencrypted network traffic, logs, ...</li>
<li>Storing SSL certificate insecurely</li>
<li>Credentials passed via insecure <code>http</code> connection</li>
<li>Expose session id's in URLs, via unencrypted network, logs, ...</li>
</ul>
</section>
<section>
Expand All @@ -293,8 +294,11 @@ <h3>Side Channel Attack Vectors</h3>
<li>&ldquo;Remember me&rdquo;</li>
<li>Forgot Password</li>
<li>Secret Questions</li>
<li>Storing Credentials unencrypted</li>
</ul>
<hr>
<p>
Make sure your application does not store credentials in its database unencrypted!
</p>
</section>
</section>

Expand Down Expand Up @@ -348,7 +352,10 @@ <h5>...as do unsalted strong hash algorithms</h5>
</table>
<hr>
<p>
<small>Breaking those hashes with your favorite rainbow table or <a href="https://crackstation.net/">CrackStation</a> should be easy, even though two of them seem sufficiently long.</small>
<small>
Breaking those hashes with your favorite rainbow table or <a href="https://crackstation.net/">CrackStation</a>
should be easy, even though the last two of them seem sufficiently long with their 256 and 512bit size!
</small>
</p>
</section>

Expand All @@ -369,15 +376,16 @@ <h3>Common Authorization Mistakes</h3>

<section>
<section>
<h3>Tampering for Access Control Issues</h3>
<h3>Request Tampering for Privilege Escalation...</h3>
<h5>...and finding all kinds of Access Control Issues</h5>
<pre><code class="command" data-trim contenteditable>
http://logistics-worldwi.de/showShipment?id=40643108
</code></pre>
<pre><code class="command" data-trim contenteditable>
http://my-universi.ty/api/students/6503/exams/view
</code></pre>
<pre><code class="command" data-trim contenteditable>
http://cheap-sh.op?content=index.html
http://document-warehou.se/landingpage?content=index.html
</code></pre>
</section>

Expand Down

0 comments on commit 78cfa54

Please sign in to comment.