This vulnerability allows an attacker to impersonate another user or a high-privilege user like an admin. We learned how to perform basic privilege escalation and how to protect against it.
When your website is not checking which website is requesting a redirect and allows any redirect of your users to external (unsafe?) URLs then your site may be vulnerable to Open Redirects.
Today we learned how to take advantage of Open Redirects and how to protect our users against them.
Links in the video:
What is an Open Redirection Vulnerability and How to Prevent it? - https://www.netsparker.com/blog/web-security/open-redirection-vulnerability-information-prevention/?utm_source=hacksplaining&utm_medium=post&utm_campaign=articlelink
Password Mismanagement is a vulnerability that occurs when you don't safely handle passwords and user authentication with respect to passwords.
Having a set of rules for password creation, hashing passwords, and having users solve captchas is a great way to make password management a safe process.
Information Leakage occurs when you (unintentionally?) give the user information they don't need -- You expose your server information or languages used information.
Links in video:
zero-day vulnerability - https://www.hacksplaining.com/glossary/zero-day-exploits
How to Disable Directory Listing on Your Web Server - https://www.netsparker.com/blog/web-security/disable-directory-listing-web-servers/?utm_source=hacksplaining&utm_medium=post&utm_campaign=articlelink
Apache Tomcat 9 - Security Considerations - https://www.netsparker.com/blog/web-security/disable-directory-listing-web-servers/?utm_source=hacksplaining&utm_medium=post&utm_campaign=articlelink
Why is Source Code Disclosure Dangerous? - https://www.netsparker.com/blog/web-security/disable-directory-listing-web-servers/?utm_source=hacksplaining&utm_medium=post&utm_campaign=articlelink
UglifyJS – a JavaScript parser/compressor/beautifier. - https://github.com/mishoo/UglifyJS
Closure Compiler, a popular JavaScript obfuscator. - https://developers.google.com/closure/compiler/
javascript-obfuscator, another popular JavaScript obfuscator. - https://obfuscator.io/
File upload vulnerabilities occur first because you accept some sort of files from the user on your system. These files are not sanitized and can be unwanted files like zip which are so big that system resources are exhausted or exe files which can compromise your system if executed. So be sure before you allow users to upload files to your system.
Links in the video:
An Introduction to Web-shells - https://www.acunetix.com/blog/articles/introduction-web-shells-part-1/?utm_source=hacksplaining&utm_medium=post&utm_campaign=articlelink
Unrestricted File Upload Vulnerabilities - https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload
Reflected XSS is a vulnerability that occurs when your website shows back the entry of users on the webpage to them (hence the name reflected).
Today we learned how we can use Reflected XSS to our advantage, protect against it, and test ourselves to check our knowledge of it.
Links in the video:
How Cross-site Scripting Works - https://www.acunetix.com/websitesecurity/cross-site-scripting/?utm_source=hacksplaining&utm_medium=post&utm_campaign=articlelink
Content security policy - https://web.dev/csp/
CSP (Content Security Policy) on the Mozilla Developer Network - https://developer.mozilla.org/en-US/docs/Web/Security/CSP
Content Security Policy Explained - https://www.netsparker.com/blog/web-security/content-security-policy/?utm_source=hacksplaining&utm_medium=post&utm_campaign=articlelink
Session Hijacking is a vulnerability that occurs when you have relatively simple and guessable session IDs and a hacker can guess a user's session id to gain access to the session.
In this video we learned how to perform session hijacking and how to defend against it with best practices.
The DOM-BASED XSS attack basically works when you use URI fragments (# character in the URL and content after that) in your website to save where your user was at the last time and the hacker uses that to inject his script to download the user's cookie whenever visit the URL again.
Today we learned how we can use Dom-Based XSS to our advantage, protect against it, and test ourselves to check our knowledge of it.
Link in the video:
How Cross-site Scripting works - https://www.acunetix.com/websitesecurity/cross-site-scripting/?utm_source=hacksplaining&utm_medium=post&utm_campaign=articlelink
Content security policy - https://web.dev/csp/
CSP (Content Security Policy) on the Mozilla Developer Network - https://developer.mozilla.org/en-US/docs/Web/Security/CSP
DOM Based Cross-site Scripting Vulnerability - https://www.netsparker.com/blog/web-security/dom-based-cross-site-scripting-vulnerability/?utm_source=hacksplaining&utm_medium=post&utm_campaign=articlelink
Content Security Policy Explained - https://www.netsparker.com/blog/web-security/content-security-policy/?utm_source=hacksplaining&utm_medium=post&utm_campaign=articlelink
Cross-site scripting (XSS) is one of the most common methods hackers use to attack websites. XSS vulnerabilities permit a malicious user to execute arbitrary chunks of JavaScript when other users visit your site.
We will learn how we can attack a website using XSS Scripting and learn how to protect ourselves against XSS Scripting, and lastly test ourselves to understand if we have correctly grasped the concept of XSS Scripting.
Links in the Video:
How XSS Works - https://www.acunetix.com/websitesecurity/cross-site-scripting/?utm_source=hacksplaining&utm_medium=post&utm_campaign=articlelink
Content Security Policy - https://web.dev/csp/
CSP on Mozila developer network - https://developer.mozilla.org/en-US/docs/Web/Security/CSP
Content Security Policy Explained - https://www.netsparker.com/blog/web-security/content-security-policy/?utm_source=hacksplaining&utm_medium=post&utm_campaign=articlelink
Learn about how to perform basic SQL Injection, We will explore the techniques on how to protect ourselves against SQL Injection attacks in various programming languages and lastly test ourselves to see if we have grasped the concept of SQL Injection in Lesson 1 of Hacking Lessons
Links in the video:
Exploiting SQL Injection - https://www.acunetix.com/blog/articles/exploiting-sql-injection-example/?utm_source=hacksplaining&utm_medium=post&utm_campaign=articlelink
SQL Injection CheatSheet - https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/?utm_source=hacksplaining&utm_medium=post&utm_campaign=articlelink
Relevant XKCD - https://xkcd.com/327/