Web Application Security Essay Sample


Throughout the old ages many draw a bead oning coders and many astonishing web applications have surfaced. Though these applications and web sites had astonishing functionality and were really user-friendly they all shared one common defect: A deficiency of attending to security. Due to this ground many of them were rejected by the public community or were even taken offline by malicious aggressors. Due to these grounds the creative activity of this paper came to be. This paper will touch on many subjects including: good cryptography patterns. insecure hashing and encoding methods. SQL injections. session arrested development. cross-site scripting ( XSS ) . file inclusion. and arbitrary bid injection.

Please retrieve that while reading this PHP will be the primary linguistic communication referenced. nevertheless if you use other server side languages the same constructs may still be applied. Throughout this composing it is assumed that the reader will hold a basic working cognition of PHP. HTML. Javascript. and MySQL. every bit good as cognition of the basic workings of web applications ( database connexions. content presentation. etc ) . By the terminal of this paper you will be equipped with the cognition of efficient cryptography patterns which will let you to plan and develop secure applications. protected against the most widely applied techniques used by the bulk of black-hat crackers and white-hat incursion examiners.

Coding Practices

Even the most basic of all application security. whether it be web. desktop. waiter or cloud based. starts with good cryptography patterns. The definition of “good” cryptography patterns varies from coder to programmer nevertheless. they all revolve around two primary constructs: efficiency and “looks” . The chief end here is to larn the really rudimentss. nevertheless as everyone has their ain manner of making things. you should happen what works best for YOU and lodge with it. First we’ll start with expressions.

You may be believing to yourself “who cares how my codification looks? ” . good. you should! If you code expressions good and is good commented so you. every bit good as anyone you ask for aid. will be able to easy scan through the codification and rapidly pin-point any mistakes in it. Let’s expression at an illustration. Quickly review both of the codifications below and place the mistake ( you should non pass more so 10 seconds on each ) .

ALSO READ  Using Computers Essay Sample

Did you notice the mistake? Both illustrations were the exact same codification. and had the exact same mistake in them ( losing a period after the $ cardinal variable in the foreach cringle ) ; nevertheless. as you may hold noticed illustration two was a batch easier to read. therefore doing it that much easier to place mistakes. The most common method is to indent blocks of codification that are already within blocks. this particularly proves true with anything that uses curly brackets ( ex. Functions. if statements. while statements. etc. ) . Indenting is the one thing that about all coders. regardless of what linguistic communication they are utilizing. hold on.

Some linguistic communications ( such as python ) even require indenting codification. As stated earlier. all coders have their ain manner of making things. nevertheless. the most common method is merely one indent per degree. with the exclusion of degree one. When the word “level” is mentioned. it means every block of codification that is within another block. for simplicity’s interest. the gap and shutting PHP tags denote the start and terminal of degree one and every clip you encounter an gap curly bracket a new degree Begins and a shutting curly bracket denotes the terminal of a degree. Take the undermentioned codification for illustration:

The above book will extinguish the hazard of RFI by restricting the input to merely two colourss. although it is still non wise to swear user input for maps such as include or require.

Directory Transversal

Directory Transversal was one of the first web site onslaughts. and still remains reasonably popular among hackers today. Directory transversal is an onslaught which involves “working backwards” through the directory tree to catch an unintended ( normally “protected” ) file off of the waiter. This is chiefly due to an improperly configured web-server nevertheless there are still methods a coder may take to forestall it. To understand how a directory transversal onslaught works. one must foremost understand how a directory tree is structured. The typical “tree” begins with the “root” or parent booklet. which is followed by sub-folders. The followers is a typical illustration of a Unix and Windows directory tree: Unix: / | | home| | |johndoe| ← Sub-folder ( kid ) ← Root Folder ( parent ) ← Sub-folder ( kid )

Windows: degree Celsius: | | Users | | | johndoe | ← Sub-folder ( kid ) ← Root Folder ( parent ) ← Sub-folder ( kid )

ALSO READ  Certification Authority Essay Sample

With a basic apprehension of how a directory tree works. every bit good as an ill-configured web server an aggressor could see files that are hidden from the general populace. The undermentioned illustration shows this signifier of onslaught in action.

Hypertext transfer protocol: //www. goodsite. com/images/ . . / . . / . . / . . /

Normally web-servers are configured to non expose files and directories and most are expeditiously configured to protect against these type of onslaughts. nevertheless merely because most are does non intend that every waiter is set up the same. By typing the illustration URL in their web-browser the aggressor would be able to see the root directory of the web-server. with an end product similar to the followers:

As one may see. although going less and less common a waiter with this exposure may be damaging. The aggressor could expeditiously utilize this onslaught to open up and copy the passwd file of the waiter and so utilize tools such as johntheripper to check the watchword efficaciously “rooting” the waiter and holding full entree. The most efficient manner to protect against this is to entree your web-server’s security file ( normally located at: /etc/apache2/conf. d/security ) so happen and un-comment the undermentioned lines:

# # # # AllowOverride None Order Deny. Allow Deny from all


Making so will “disable entree to the full file system except for the directories that are explicitly allowed later”10. This will wholly forestall a directory transveral onslaught by explicitly restricting entree to merely files specified by the web-server. If one is utilizing a shared host or does non configure the waiter themselves so the programmer/developer must bespeak this action to be carried out by the host or the system decision maker.

Arbitrary Command Injection

Although Arbitrary Command Injection ( ACI ) is going less and less of a job due to both programmer consciousness and deficiency of cognition of bid executing maps of web development linguistic communications. it is still an onslaught worth adverting. Arbitrary bid injection takes topographic point when the web application contains a map that straight executes bids on the waiter. normally with PHP’s White House map.

When an aggressor additions entree to this ability the aggressor may put to death any bid s/he wants. this is reasonably common in “web shells” ( books uploaded to the web-server to put to death bids. entree databases. etc. ) that are uploaded utilizing the file inclusion onslaught or through insecure upload signifiers. The best method in protecting these maps is to let merely decently authorized individuals entree every bit good as bound the type of bids that may be executed. This ability along with antecedently mentioned security safeguards will restrict the hazard of this signifier of onslaught.

ALSO READ  Identification , Authentication , and Authorization Techniques Authentication Essay Sample

Closing Ideas

As one may see there are many different onslaughts vectors that may be used on web applications. and non all of them were covered in this paper. The easiest manner in guarding against onslaughts is to filtrate both entrance and surpassing “untrusted” informations and to be certain that users are authenticated decently. Following those two simple methods most. but non all. web exposures can be efficaciously prevented. In the terminal. all security hazards efficaciously fall onto the shoulders of the coder. as scheduling linguistic communications do non come with constitutional security steps. and all hazards point to a few common human mistakes: indolence. deficiency of cognition. and deficiency of concern.


“Block Cipher Modes of Operation. ” Wikipedia. the Free Encyclopedia. Wikipedia Documentation Group. 27 Oct. 2011. Web. 30 Oct. 2011. .


Davis. Michael A. “So Much Data. so Small Encryption. ” Information Week. Information Week. 21 Nov. 2009. Web. 30 Oct. 2011. .


Mallett. Ernest E. “Creating Secure Passwords. ” Programing – PhpTaskManager Updated! – Newss: RejectedFreaks. Darkvengance. 30 Sept. 2011. Web. 30 Oct. 2011. .


Mallett. Ernest E. “Secure Hashing. ” Programing – PhpTaskManager Updated! – Newss: RejectedFreaks. Darkvengance. 30 Sept. 2011. Web. 30 Oct. 2011. .


Mallett. Ernest E. Sencryption. Brewton: Darkvengance. 29 Sept. 2011. PHP. “PHP: Mcrypt – Manual. ” PHP: Hypertext Preprocessor. PHP Documentation Group. 28 Oct. 2011. Web. 30 Oct. 2011. .



“PHP: Print – Manual. ” PHP: Hypertext Preprocessor. PHP Documentation Group. 28 Oct. 2011. Web. 30 Oct. 2011. .


Security. Configuration File. Shiflett. Chris. “PHP Security Guide: Form Processing. ” PHP Security Consortium. PHP Security Consortium. Web. 30 Oct. 2011. .



Williams. Jeff. “XSS ( Cross Site Scripting ) Prevention Cheat Sheet – OWASP. ” Main Page – OWASP. Ed. Jim


Manico. Open Web Application Security Project. 9 Oct. 2011. Web. 30 Oct. 2011. .