Articles

Mitigations for Common Web Application Flaws

The most prominent components of web applications that intruders will first seek to exploit are vulnerabilities within the web platform. The web platform commonly includes:

  • Web server software (such as IIS or Apache).
  • Extensions to the web server, such as ISAPI filters and extensions, or Apache modules.
  • Dynamic execution environments like ASP.NET, PHP, and J2EE (also referred to as application servers).
  • Services and daemons, such as user forums or web guestbook packages.

Authentication flaws

  • Set a strong password policy which includes Capital letter, Small letter, numbers and some special characters.
  • Implement password salting.
  • Implement password masking (****).
  • Display generic and standard messages in case of authentication failure.
  • Validate password policy at both the client side and server side.
  • Encrypt the password in storage using a strong algorithm.
  • Implement a secure password recovery mechanism.
  • Use multifactor authentication for sensitive areas.
  • Verify the old password while changing to a new password.
  • Make use of OAuth, Centrify, OpenID, and Kerberos or similar tools for implementing single sign-on (SSO).

Authorization flaws

  • Implement the principle of least privilege.
  • Implement role-based access control.
  • Use JSON web tokens (JWT) for secure authentication and information exchange.
  • Implement validation checks to prevent authorization creep, and vertical and horizontal privilege escalation.

Session management flaws

  • Set an idle session timeout value to limit the duration.
  • Set a complex session ID.
  • Invalidate the session upon termination of the browser window.
  • Regenerate new session ID upon successful authentication or privilege change.
  • Implement protection for cross-site request forgery (CSRF).

Input validation flaws

  • Client-side data validation.
  • Server-side data validation.
  • Blacklisting or whitelisting of input characters.
  • Data sanitization.
  • Content type checks for file uploads.
  • Implement virus scanner for file uploads.
  • Output validation and encoding.
  • Use prepared statements, parameterized queries, and bind variables in the database.

Auditing and logging flaws

  • Capture login/logout, failed login, new user creation, and data modification events. Password changes and detailed activity events should also be captured along with user name, timestamp, and the end user’s source IP address.
  • Ensure that logging cannot be used to deplete system resources, for example by filling up disk space or exceeding the database transaction log space, leading to denial of service.
  • Ensure that logs are protected from tampering .

Have something to say about this article? Comment below or share it with us on Facebook or Twitter.

H4ck0
Step by step hacking tutorials about wireless cracking, kali linux, metasploit, ethical hacking, seo tips and tricks, malware analysis and scanning.
https://www.yeahhub.com/

WHERE SHOULD WE SEND

HACKING TUTORIALS & INFOSEC NEWS?

Subscribe to Our Newsletter and Get Instant Delivered to Your Email Inbox.

We respect your privacy and take protecting it seriously.

Leave a Reply

Your email address will not be published. Required fields are marked *

2 × four =