We web security enthusiasts got together to learn and share about Computer and Web Security.
Started by testing a few Table Top Applications ;)
Sympathetic, Exploratory, Usability and User Experience testing.
Eventually the below topics formed the basis of our learning.
Types of Security threats:
1) SQL Injection
Injecting data into the database using SQL Queries.
Upon execution of the query:
Those error messages that give away sensitive information to the attacker qualifies for a STANDARD Injection.
Those error messages that do not give away sensitive information to the attacker qualifies for a BLIND Injection.
2) Code Injection
Testers: Test, if the data base is yielding results readily by forging such attacks.
Cross Site Scripting
Test for server and client side vulnerabilities.
Enable private browsing in Firefox, in-private browsing in IE and incognito browsing in Google chrome browser.
4) LFI - Local File Inclusion
Attack planted by using Hypertext PreProcessor(PHP) scripting to get an access to the readable files on the server.
5) RFI - Remote File Inclusion
Attack planted by using PHP Scripting to inject files to a server.
The above two attacks are caused due to unvalidated input data.
Test with valid and invalid input data and test for validation checks on the input fields.
6) CSRF - Cross Site Request Forgery
In this type of attack, Forged HTTP requests are sent to a vulnerable server disguised as valid client requests.
When testing, test for client side input request validation and server side validation.
7) Unvalidated Redirects
8) Security Misconfiguration
An attack caused when the servers are misconfigured. Misusing this information leads to an attack or a compromising situation on the server.
Test against a checklist of Server Vulnerabilities. (If any of you readers, have this list please share it).
9) Sensitive Data Exposure
Protect server and client side sensitive data from being exposed to unintended users. Provide appropriate roles and responsibilities to server admin users and others.
10) Known Vulnerabilities
Exploiting Server, OS and applications using the known vulnerabilities with several search results (based on the user 's query) giving away the attacker with full fledged details on how to plant an attack coupled with other ideas are readily available on YouTube.
Protect by upgrading the system(under threat) against known threats.
The above aren't a sundry selection but forms the top web security threats.
(Top 10 2013 - OWASP)
The other discussions that followed are listed below:
- Battery types - Laptop battery , power supply and CMOS battery.
- Bypassing the BIOS password by removing the CMOS battery.
- RJ45 (Registered jack 45)
- Understanding Network address translation(NAT) and Domain name system(DNS)
- NAT - Translates the IP address provided by the Internet Service Provider(ISP) to System specific IP address.
- DNS - Domain Name System Server.
7. Difference between hub,switch and routers.
If you readers wish to be a part of the 'Sit Down Series' on Web Security. Do leave a
comment here. Care to share your learning's, would love to learn from you.
Challenge yourself, your learning methods and you will love IT.
Here 's a picture of one of the Table Top Application's 'Scribble Pad' that CCD provides its valuable customers. Thank you CCD.