Websites & Web Security

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Injection

Unsanitized input becomes part of commands/queries. Defense: parameterized queries/ORMs, input validation, least privilege for DB accounts.

2
New cards

Cross-Site Scripting

Malicious scripts injected into pages seen by other users. Defense: output encoding, Content Security Policy (CSP), input validation.

3
New cards

Cross-Site Request Forgery

Attacker tricks a browser into making authenticated requests. Defense: CSRF tokens, SameSite cookies, require re-authentication for sensitive actions

4
New cards

Broken Authentication & Session Management:

Weak passwords, session fixation, or exposed tokens. Defense: secure session cookies (HttpOnly, Secure, SameSite), multi-factor authentication, strict password policies, token expiration.

5
New cards

Broken Access Control

Users access or perform actions they shouldn’t. Defense: enforce server-side authorization checks, use role-based access control (RBAC), deny-by-default.

6
New cards

Sensitive Data Exposure

Storing/transmitting secrets insecurely. Defense: TLS for transit, encryption at rest, proper key management, avoid sensitive data in logs

7
New cards

Security Misconfiguration

Default credentials, verbose error messages, unnecessary services exposed. Defense: hardening guides, removing unused features, secure defaults.

8
New cards

Insecure Direct Object References

Predictable identifiers allow access to others’ resources. Defense: unpredictable identifiers, server-side authorization checks

9
New cards

Insufficient Logging & Monitoring

Attacks go unnoticed. Defense: centralized logging, alerting, retention policies, incident response plan.

10
New cards

Reconnaissance

c______ (passive first): gather public info (DNS, subdomains, certificate transparency, public endpoints).

11
New cards

Mapping & discovery

______ : enumerate endpoints, files, parameters, APIs, and inputs.

12
New cards

Analysis & identification

______: identify potential weaknesses in authentication, input handling, access control, configuration.

13
New cards

Validation

_____ (non-destructive): verify vulnerabilities in a safe way (proof-of-concept that does not expose or exfiltrate real data).

14
New cards

Reporting & remediation

_______ : document findings with reproducible steps, risk level, and recommended fixes.