Websites & Web Security

0.0(0)
studied byStudied by 5 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

14 Terms

1
New cards

Injection

Unsanitized input becomes part of commands/queries. Defense: parameterized queries/ORMs, input validation, least privilege for DB accounts.

2
New cards

Cross-Site Scripting

Malicious scripts injected into pages seen by other users. Defense: output encoding, Content Security Policy (CSP), input validation.

3
New cards

Cross-Site Request Forgery

Attacker tricks a browser into making authenticated requests. Defense: CSRF tokens, SameSite cookies, require re-authentication for sensitive actions

4
New cards

Broken Authentication & Session Management:

Weak passwords, session fixation, or exposed tokens. Defense: secure session cookies (HttpOnly, Secure, SameSite), multi-factor authentication, strict password policies, token expiration.

5
New cards

Broken Access Control

Users access or perform actions they shouldn’t. Defense: enforce server-side authorization checks, use role-based access control (RBAC), deny-by-default.

6
New cards

Sensitive Data Exposure

Storing/transmitting secrets insecurely. Defense: TLS for transit, encryption at rest, proper key management, avoid sensitive data in logs

7
New cards

Security Misconfiguration

Default credentials, verbose error messages, unnecessary services exposed. Defense: hardening guides, removing unused features, secure defaults.

8
New cards

Insecure Direct Object References

Predictable identifiers allow access to others’ resources. Defense: unpredictable identifiers, server-side authorization checks

9
New cards

Insufficient Logging & Monitoring

Attacks go unnoticed. Defense: centralized logging, alerting, retention policies, incident response plan.

10
New cards

Reconnaissance

c______ (passive first): gather public info (DNS, subdomains, certificate transparency, public endpoints).

11
New cards

Mapping & discovery

______ : enumerate endpoints, files, parameters, APIs, and inputs.

12
New cards

Analysis & identification

______: identify potential weaknesses in authentication, input handling, access control, configuration.

13
New cards

Validation

_____ (non-destructive): verify vulnerabilities in a safe way (proof-of-concept that does not expose or exfiltrate real data).

14
New cards

Reporting & remediation

_______ : document findings with reproducible steps, risk level, and recommended fixes.