<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Gincy Mol A G</title>
    <description>The latest articles on Forem by Gincy Mol A G (@gincymolag).</description>
    <link>https://forem.com/gincymolag</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F400385%2F5d4e2cca-93a8-42ad-9b33-3beeafc6fd12.jpeg</url>
      <title>Forem: Gincy Mol A G</title>
      <link>https://forem.com/gincymolag</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/gincymolag"/>
    <language>en</language>
    <item>
      <title>Web Cache Poisoning</title>
      <dc:creator>Gincy Mol A G</dc:creator>
      <pubDate>Sat, 15 Jan 2022 09:07:03 +0000</pubDate>
      <link>https://forem.com/gincymolag/web-cache-poisoning-29cd</link>
      <guid>https://forem.com/gincymolag/web-cache-poisoning-29cd</guid>
      <description>&lt;p&gt;Web cache poisoning attacks target the intermediate storage points such as POP servers, load balancers, proxies etc which reside between web servers and client devices.&lt;/p&gt;

&lt;p&gt;Instead of passing to the server a request that the CDN already knows its response to (static file), it can return a response immediately to the client and reduce both server load and response time when the cache responds. &lt;/p&gt;

&lt;p&gt;The response caches to avoid wasting time processing requests frequently send to Servers and CDNs (Content delivery networks, Cloudflare for example). &lt;/p&gt;

&lt;p&gt;Web cache poisoning involves two phases:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Attackers must obtain a response from the back-end server that recklessly contains some kind of dangerous payload. &lt;/li&gt;
&lt;li&gt;After the successful request, make sure that the response is cached and subsequently served to the intended victims.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Even Though being a known vulnerability, web cache poisoning continues to turn up around the web.&lt;/p&gt;

&lt;p&gt;In wide research of numerous websites, including some most popular internet services, security researcher Iustin Ladunca (Youstin) discovered 70 cache poisoning vulnerabilities recently with diverse impacts.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;More detailed version along with how you can avoid these vulnerabilities is published at :&lt;/em&gt; &lt;a href="https://beaglesecurity.com/blog/vulnerability/web-cache-poisoning.html"&gt;&lt;em&gt;https://beaglesecurity.com/blog/vulnerability/web-cache-poisoning.html&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Session Security</title>
      <dc:creator>Gincy Mol A G</dc:creator>
      <pubDate>Wed, 13 Jan 2021 09:57:53 +0000</pubDate>
      <link>https://forem.com/gincymolag/session-security-3kob</link>
      <guid>https://forem.com/gincymolag/session-security-3kob</guid>
      <description>&lt;p&gt;Over the years, web application security began with sessions and now sessions are based on tokens to improve overall session security. &lt;/p&gt;

&lt;p&gt;According to the most recent OWASP Top 10, “&lt;em&gt;Application implementations related to authentication and session management are often implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users’ identities temporarily or permanently.&lt;/em&gt;” &lt;/p&gt;

&lt;p&gt;These security flaws can be extremely critical to web applications. This can impact high risk to businesses. Not just the exposure of sensitive data,  but it can also allow hackers to steal accounts from others and impersonate users. Both internal and external attackers can take advantage of these vulnerabilities.&lt;/p&gt;

&lt;p&gt;A session is started when a user authenticates to an authentication server to prove their identity using a password or another authentication protocol. Session management needs secure cryptographic network communications, ie, secure sharing of secrets with authenticated users. &lt;/p&gt;

&lt;p&gt;Some of the popular attacks on session:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Manipulator in the middle attack (MITM)&lt;/em&gt;&lt;/strong&gt; occurs when an attacker intercepts a request between a user and the server. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Cross-site scripting (XSS)&lt;/em&gt;&lt;/strong&gt; is a security exploit which allows an attacker to inject malicious scripts into a website.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Cross-site request forgery (CSRF)&lt;/em&gt;&lt;/strong&gt; is an attack that forces an authenticated end-user to execute unwanted actions on a web application.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Session fixation&lt;/em&gt;&lt;/strong&gt; is an attack that permits an attacker to hijack into a valid user session. &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;How to secure a session:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;HTTPS communication&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Validate JWT tokens&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Do not hardcode tokens&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Secure and HTTPonly cookies&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Lengthy and random session ID&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;More detailed version along with how you can avoid these vulnerabilities is published at :&lt;/em&gt; &lt;a href="https://beaglesecurity.com/blog/article/session-security.html"&gt;&lt;em&gt;https://beaglesecurity.com/blog/article/session-security.html&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Store and Secure Sensitive Data in Web Applications</title>
      <dc:creator>Gincy Mol A G</dc:creator>
      <pubDate>Wed, 14 Oct 2020 11:16:09 +0000</pubDate>
      <link>https://forem.com/gincymolag/store-and-secure-sensitive-data-in-web-applications-jl8</link>
      <guid>https://forem.com/gincymolag/store-and-secure-sensitive-data-in-web-applications-jl8</guid>
      <description>&lt;p&gt;Software security is utterly essential. A secured web application is the most essential requirement for any online business. If the web application has any security vulnerabilities, it’s prone to attacks.&lt;/p&gt;

&lt;p&gt;Before a web application host is hosted on a web server and exposed to the external world, it must be secured  properly. Architects, developers, database administrators - everyone plays a key role in choosing  the most secure mechanisms suitable for a particular application. Testers with expertise in  cyber security should perform security tests on the application. Whatever security measures that are going to be implemented, should be reviewed thoroughly and should conform to industry best practices.&lt;/p&gt;

&lt;p&gt;Understanding the necessary data that needs to be stored and encrypting them is one of the most important things to be followed by every web developer. Securing data is the most significant aspect of application security. These data can include any information like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Passwords&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Encryption keys&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Passphrases&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Credit card numbers&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;OAuth tokens&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Personal contact information such as names, email addresses, phone numbers, user accounts, physical addresses, etc&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Data security involves the security of: Data-at-rest, Data-in-transit and  for storing these data, the right storage mechanisms should be chosen.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;How to secure this sensitive information?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Authentication&lt;/em&gt; : Authentication is the process of recognizing the identity of a user. Traditionally, authentication was accomplished by the systems or resources by using a combination of username and password to authenticate a user. User authentication takes several forms, but all are based on the combination of authentication factors. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;Access control&lt;/em&gt; : The purpose of authentication is to let the application know who you are, thus by identifying the identity, privileges are given to users. Access control, grants the necessary privileges, described as discretionary or non-discretionary. The access control models grant access privileges to users based on the work that they do within an organization.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Encryption&lt;/em&gt; : There are many ways for encrypting data at rest and data in motion. Data can be encrypted  in many ways - Full disk encryption of data at the disk level, Directory level (or Filesystem), File level and Application level.&lt;/p&gt;

&lt;p&gt;Refer the blog for more information : &lt;a href="https://beaglesecurity.com/blog/article/how-to-store-and-secure-sensitive-data-in-web-applications.html"&gt;https://beaglesecurity.com/blog/article/how-to-store-and-secure-sensitive-data-in-web-applications.html&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>SSL/TLS Vulnerabilities</title>
      <dc:creator>Gincy Mol A G</dc:creator>
      <pubDate>Fri, 10 Jul 2020 14:36:14 +0000</pubDate>
      <link>https://forem.com/gincymolag/ssl-tls-vulnerabilities-27no</link>
      <guid>https://forem.com/gincymolag/ssl-tls-vulnerabilities-27no</guid>
      <description>&lt;p&gt;Transport Layer Security (TLS) is a security protocol that provides authentication, privacy, and data integrity. It is most widely-deployed and used for web browsers and other applications. &lt;/p&gt;

&lt;p&gt;TLS is the successor protocol to SSL. These cryptographic protocols have had their own share of flaws like any other technology. &lt;/p&gt;

&lt;p&gt;So, it is important to understand the flaws in order to secure your servers. Some of the SSL/TLS vulnerabilities are:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;POODLE ATTACK&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack, an active MITM attacker can force a browser to downgrade the session to SSLv3, which can then be exploited. The vulnerability affects TLS implementations that don't properly check the structure of the padding used in TLS packets.    &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;FREAK  ATTACK&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Factoring Attack on RSA-EXPORT Keys (FREAK) is an SSL/TLS vulnerability that can allow an attacker to decrypt secure communications between vulnerable clients and servers. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SWEET32: BIRTHDAY ATTACK&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The SWEET32 attack exploits a collision attack in SSL/TLS protocol cipher suites. When CBC mode of encryption is used, these cipher suites uses 64-bit block ciphers to extract plain text of the encrypted data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BLEICHENBACHER WITH THE ROBOT ATTACK&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Return of Bleichenbacher’s Oracle Threat vulnerability, also known as ROBOT, allows an attacker to gain the RSA key necessary to decrypt TLS traffic under some specific conditions. An attacker can exploit this vulnerability by sending crafted TLS messages to the device, which would act as an oracle and allow the attacker to carry out a chosen-ciphertext attack.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BEAST ATTACK&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The BEAST attack exploits a weakness in SSL/TLS cipher-block chaining (CBC). It allows a man-in-the-middle attacker to recover certain session information.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CRIME ATTACK&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;CRIME, “Compression Ratio Info-leak Made Easy “, is a security exploit against secret web cookies over connections using the HTTPS and SPDY protocols that also use data compression.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BREACH ATTACK&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;BREACH, “Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext”, targets information compressed in HTTP responses through HTTP compression.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;More detailed version along with how you can avoid these vulnerabilities is published at :&lt;/em&gt; &lt;a href="https://beaglesecurity.com/blog/blogs/2020/07/06/Importance-of-TLS-1-3-SSL-and-TLS-Vulnerabilities.html"&gt;&lt;em&gt;https://beaglesecurity.com/blog/blogs/2020/07/06/Importance-of-TLS-1-3-SSL-and-TLS-Vulnerabilities.html&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>testing</category>
      <category>webdev</category>
    </item>
  </channel>
</rss>
