web-security

Domain based security for widgets

The web sites will be register and get an API key to use widgets. For example; Site A is registered as sitea.com for widget. But the main problem is, the widget can not be accessable from siteb.com with API key of sitea.com. Are there any way to implement this? ...

SSL security concern

I'm wondering why ssl encrypted data can't be cracked easily once the packets are intercepted. As i understand it when you connect to a site like facebook the browser and site agree on a cipher, what stops the sniffer from seeing what cipher they agreed to? ...

How do I provide more security for checking source of the request

Hi All, I am developing one web application ( using php), I want to provide more security to application so that no one can easily break the functionality. Brief explanation about my problem : In one module there is one stage where I am checking the source of the request ( from where this request is coming from ) Currently, I am using...

what is the best module in perl that can implement paros proxy functionality

did someone know about a good perl module that implement the most of the functionality of paros proxy http://www.parosproxy.org/ if yes could someone provide some modules do that ...

is there any way to find orphaned pages without having access to the server?

Let's say I am testing beta pages on my server and was too lazy to password protect the pages I put up. I am putting them up in some obscure named sub-directory. Is there any way of people seeing the beta pages without guessing around at file names or looking at the directory from an FTP client? These are all orphaned pages, there is no...

Password protected directory and files in PHP

Im creating a simple private page with links to some files to download. I've done it with simple session management but I have a problem: if somebody click on the file-url he can download the file without the authentication. So what I can do to avoid this? I can make a HTTP Authentication but I want a custom login form and not the window...

Is it possible to perform a cross site site request forgery attack on a URL that returns a JSON object?

I'm aware that there is a Cross site forgery attack that can be performed on a request that returns an array by overloading the Array constructor. For example, suppose I have a site with a URL: foo.com/getJson that returns: ['Puff the Dragon', 'Credit Card #'] This would normally be Javascript eval'd by my own site after an XHR re...

Security: Brute-forcing GET-requests by URL?

Hi everybody, what should my concerns be if I we're about to make an application that handles logins the following way: http://api.myApp.example/printSomething/username/password/ How insecure is it compared to a normal login page that are based on POSTed user details (username+password)? Is there a difference? Thanks ...

Best libraries/practices to prevent OWASP Top 10 Vulnerabilities

I'm looking for the best reusable libraries and inbuilt features in ASP.Net to prevent the OWASP top 10 security vulnerabilities like injection, XSS, CSRF etc., and also easy to use tools for detecting these vulnerabilities for use by the testing team. When do you think is the best time to start incorporating the security coding into ...

Can I get into trouble for identifying vulnerabilities in someone elses website?

Is it possible to get into legal trouble for identifying vulnerabilities in a web application even if you don't exploit them? I have considered using tools like NetSparker on occasion to see if a site has any vulnerabilities and I'd like to contact the owner of the site to see if they'd be interested in me fixing it. I suspect that s...

(PHP - Session) How can user restrict to access direcly to controller.php , only allow access from view.php?

Hi, I am a beginner in PHP. How can I restrict user access to controller.php and allow access to it only via view.php? My proposal: I don't know if this is proper, or how to avoid robots accessing it directly. view.php: <?php session_start(); $_SESSION['isFromView'] = true; ?> <html> <body> <form action="...

Create a single use link

I'm writing a database front end for a website. Next to the records I want to include a link likes this: Record 1 - [Add][1] [Edit][2] [Delete][3] But I want to protect these links from being used more than once. My thinking is to pass a hash value then store a list of valid HASH values in a table somewhere and only process request...

HTTP::Proxy for pen testing tasks

Could someone provide ideas how HTTP::Proxy module is compared to others proxies like paros and burp proxy and if someone use it during his work specifically if it used by the pen testing community for real job ...

WinInet: How to override Internet Explorer's EnableNegotiate setting?

Our application uses WinInet to download data from a web server that supports Windows Authentication (Negotiate). However, when Internet Explorer's Windows Authentication setting is disabled, we only get an HTTP 401 - Unauthorized error. Both .NET's WebClient and the newer WinHTTP don't show this behaviour, but they are not a feasible o...

Perl libwhisker library

Could someone provide links for tutorial about libwhisker library? ...

how to secure access to a update server for .NET Compact Framework 2.0 application

I'm about to create the update system for .NET CF application. It is going to be a manual update system, customer will be able to "check for available updates" and install them. There will be one global update server for about 500-5000 devices. The application will be distributed as a zip compressed folder. The client application will ...

Is it possible for a malicious website to steal my cookies from another website?

From what I understand document.cookie only gets your cookies for the current site you are on. Would it be possible for a malicious site to get around this by using an iFrame, modifying my HTTP header, making a request to the target site or some other method? ...

How do I open an image and re-save it using ImageMagick?

I'm doing it to image uploads to prevent any embedded malicious code. Am I right in doing this? But yeah my main question is how to actually do it, because I've never used ImageMagick before - I've just installed it on my server. ...

Java EE 6 Security Model: How to add or delete user

I read most of the documentation, I only see the use of @RolesAllowed or @DeclareRoles, how can I add user or delete user. I have a table of users with username and password in my database, how can I make my web app to authenticate those user? How can I map these user (principal) to a particular roles. Samples code would be greatly appre...

What browsers allow javascript to be the source of image tags?

I've heard that some XSS attacks can be done by posting an image to a site that has javascript as the src attribute. Are there certain browsers that will protect me from this type of attack? ...