<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-GB">
	<id>https://luminoussheep.net/mediawiki/index.php?action=history&amp;feed=atom&amp;title=Attack_Vectors</id>
	<title>Attack Vectors - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://luminoussheep.net/mediawiki/index.php?action=history&amp;feed=atom&amp;title=Attack_Vectors"/>
	<link rel="alternate" type="text/html" href="https://luminoussheep.net/mediawiki/index.php?title=Attack_Vectors&amp;action=history"/>
	<updated>2026-04-16T19:05:41Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://luminoussheep.net/mediawiki/index.php?title=Attack_Vectors&amp;diff=75&amp;oldid=prev</id>
		<title>Martin: Created page with &quot;References http://java.boot.by/scea5-guide/ch08s03.html   === Input Validation === * data type * format * length * range * nulls * special characters e.g. [ % * | &#039;  ** square...&quot;</title>
		<link rel="alternate" type="text/html" href="https://luminoussheep.net/mediawiki/index.php?title=Attack_Vectors&amp;diff=75&amp;oldid=prev"/>
		<updated>2021-09-14T21:36:10Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;References http://java.boot.by/scea5-guide/ch08s03.html   === Input Validation === * data type * format * length * range * nulls * special characters e.g. [ % * | &amp;#039;  ** square...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;References&lt;br /&gt;
http://java.boot.by/scea5-guide/ch08s03.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Input Validation ===&lt;br /&gt;
* data type&lt;br /&gt;
* format&lt;br /&gt;
* length&lt;br /&gt;
* range&lt;br /&gt;
* nulls&lt;br /&gt;
* special characters e.g. [ % * | &amp;#039; &lt;br /&gt;
** square brackets special in sql server?&lt;br /&gt;
&lt;br /&gt;
=== Output sanitation ===&lt;br /&gt;
* prevent special tags being output by user generated content&lt;br /&gt;
* change content&lt;br /&gt;
* malicious scripts&lt;br /&gt;
* screen this on input?&lt;br /&gt;
&lt;br /&gt;
=== Buffer overflow ===&lt;br /&gt;
* typically attack on input parameters&lt;br /&gt;
* may also target output sanitisation, data injection&lt;br /&gt;
&lt;br /&gt;
=== Data Injection ===&lt;br /&gt;
* inject malicious code along with normal user data&lt;br /&gt;
* pop up windows - window injection&lt;br /&gt;
** hijack pop up window from a second site&lt;br /&gt;
* data passed to DB - sql injection&lt;br /&gt;
* prevent with input validation&lt;br /&gt;
** input, query strings, cookies - sever side validation&lt;br /&gt;
&lt;br /&gt;
=== XSS Cross site scripting ===&lt;br /&gt;
* links or scripts included in user generated content&lt;br /&gt;
* javascript, vbscript, activex, html, flash&lt;br /&gt;
* gathers data from other users&lt;br /&gt;
* steel accounts, change privileges, steel information, poison content&lt;br /&gt;
&lt;br /&gt;
=== Improper error handling ===&lt;br /&gt;
* disclosure of errors on failure&lt;br /&gt;
* information leaked can be used to generate an attack&lt;br /&gt;
* display user friendly messages &lt;br /&gt;
** e.g. unique reference that can be looked up in logs&lt;br /&gt;
* don&amp;#039;t display stack trace or internal details of error&lt;br /&gt;
&lt;br /&gt;
=== Insecure data transfer/storage ===&lt;br /&gt;
* use cryptographic techniques for sensitive data&lt;br /&gt;
* prevents eves dropping&lt;br /&gt;
* prevent tampering&lt;br /&gt;
&lt;br /&gt;
=== Weak session identifiers ===&lt;br /&gt;
* session identifiers before authorised &lt;br /&gt;
* session identifier passed over insecure channels&lt;br /&gt;
* failure to validate the session identifier&lt;br /&gt;
* failure to expire session&lt;br /&gt;
&lt;br /&gt;
=== Weak security tokens ===&lt;br /&gt;
* poor passwords - guessable&lt;br /&gt;
* echoing back passwords e.g. in cookie without proper encryption&lt;br /&gt;
* use strong/multifactor authentication&lt;br /&gt;
** digital certificates, biometrics, smart cards&lt;br /&gt;
* validate passwords&lt;br /&gt;
&lt;br /&gt;
=== Weak password exploits ===&lt;br /&gt;
* weaknesses: guessable, captured from keystrokes, password cracking tools&lt;br /&gt;
* most common security issue&lt;br /&gt;
* see above - weak security tokens&lt;br /&gt;
&lt;br /&gt;
=== Weak encryption ===&lt;br /&gt;
* faster computers =&amp;gt; algorithms/key lengths becoming viable to brute force attacks&lt;br /&gt;
* weaknesses in algorithms discovered e.g. MD5&lt;br /&gt;
* use longer key lengths - approved algorithms e.g. AES, SHA&lt;br /&gt;
&lt;br /&gt;
=== Session theft ===&lt;br /&gt;
* steeling/snooping/reusing/guessing sessionid/session cookie&lt;br /&gt;
* invalidate session after use&lt;br /&gt;
* encrypt session information&lt;br /&gt;
** use secure channel SSL/TLS&lt;br /&gt;
&lt;br /&gt;
=== Insecure configuration ===&lt;br /&gt;
* particularly web tier&lt;br /&gt;
* certificate configuraion/encryption settings&lt;br /&gt;
* default/debugging accounts&lt;br /&gt;
* unnecessary/insecure plugins/options&lt;br /&gt;
* unnecessary ports&lt;br /&gt;
* authentication configuration&lt;br /&gt;
* credential management&lt;br /&gt;
&lt;br /&gt;
=== Broken access control ===&lt;br /&gt;
* ability to view source&lt;br /&gt;
* restricted files&lt;br /&gt;
* configuration data&lt;br /&gt;
* penetration test&lt;br /&gt;
&lt;br /&gt;
=== Policy failures ===&lt;br /&gt;
* organisations policy must have all required rules&lt;br /&gt;
* rules must not conflict - appropriate qualification&lt;br /&gt;
* issues for design&lt;br /&gt;
&lt;br /&gt;
=== Audit and Loggin ===&lt;br /&gt;
* Key to non-repudiation&lt;br /&gt;
* Required to diagnose/foil attacks&lt;br /&gt;
* required to resolve bugs/race conditions&lt;br /&gt;
* Should be secured and restricted access&lt;br /&gt;
&lt;br /&gt;
=== DOS DDOS (distributed) denial of service ===&lt;br /&gt;
* impact logging&lt;br /&gt;
* router filtering&lt;br /&gt;
* fault tolerant redundant servers&lt;br /&gt;
* host name verification&lt;br /&gt;
* secure pipe, intercepting web agent, intercepting validator patterns&lt;br /&gt;
&lt;br /&gt;
=== MITM man in the middle ===&lt;br /&gt;
* SSL/TLS IPSEC or secure pipe pattern&lt;br /&gt;
&lt;br /&gt;
=== Multiple sign on ===&lt;br /&gt;
* user has to log in multiple times&lt;br /&gt;
* possible to exploit multiple simultaneous sessions/ loss of productivity forcing logout from each application&lt;br /&gt;
* use SSO to resolve&lt;br /&gt;
&lt;br /&gt;
=== Deployment problems ===&lt;br /&gt;
* review and test infrastructure security policies&lt;br /&gt;
* verify application policies consistent with infrastructure policies&lt;br /&gt;
&lt;br /&gt;
=== Code quality ===&lt;br /&gt;
* coding review&lt;br /&gt;
* secure code scanning&lt;/div&gt;</summary>
		<author><name>Martin</name></author>
	</entry>
</feed>