Logo

Lockdown environment

  • Overview
  • Communication with and between servers
  • Containers
  • Allow locked-down clients of end-users
  • Hosted repositories

Coding

  • Overview
  • Authentication
  • Use cache securely
  • File upload
  • Input validation
  • Javascript
  • Local file inclusion (LFI)
  • Output validation
  • Python
  • Arbitrary code execution
  • Remote file inclusion (RFI)
  • XSS mitigations

Libraries and frameworks

  • Overview
  • Javascript frameworks
  • npm
  • PyPI
  • Python frameworks

Protocols

  • Overview
  • Use TLS/SSL more securely

Databases

  • Overview
  • Access control
  • Input validation
  • Parameterised statements

API

  • Introduction
  • Real-time monitoring
  • Vulnerability scanning
  • Never trust user data
  • API testing tools

Security testing

  • Introduction
  • Code reviews
  • Configuration analyses
  • Database frangibility scanning
  • Architecture and design validation
  • Network vulnerability scanning
  • Web service scanning
  • Source code analysis
  • Web application vulnerability scanning
Securing web applications
  • Securing web applications
  • Blue Team
  • Improbability Blog
  • About the UU
  • Register

Securing web applications

The process of designing and reviewing a software design with security considerations in mind. Some notes …

Forever in progress ...

Lockdown environment

  • Overview
  • Communication with and between servers
  • Containers
  • Allow locked-down clients of end-users
  • Hosted repositories

Coding

  • Overview
  • Authentication
  • Use cache securely
  • File upload
  • Input validation
  • Javascript
  • Local file inclusion (LFI)
  • Output validation
  • Python
  • Arbitrary code execution
  • Remote file inclusion (RFI)
  • XSS mitigations

Libraries and frameworks

  • Overview
  • Javascript frameworks
  • npm
  • PyPI
  • Python frameworks

Protocols

  • Overview
  • Use TLS/SSL more securely

Databases

  • Overview
  • Access control
  • Input validation
  • Parameterised statements

API

  • Introduction
  • Real-time monitoring
  • Vulnerability scanning
  • Never trust user data
  • API testing tools

Security testing

  • Introduction
  • Code reviews
  • Configuration analyses
  • Database frangibility scanning
  • Architecture and design validation
  • Network vulnerability scanning
  • Web service scanning
  • Source code analysis
  • Web application vulnerability scanning

Books

_images/designing-secure-software.png
_images/web-security-for-developers.png
_images/securing-devops.png
_images/devsecops-containers-kubernetes.png
Next

Unseen University, 2023, with a forest garden fostered by /ut7.