stateless HTTP
http request and response pairs is independent and has no memory. Does not know if user is already logged in
sessions
session hijacking
GET vs POST
get is less secure as data can be found in URL
post is more secure as data is in body
OWASP top web security risks
sql injection
tricks server into executing wrong command
fred’ OR ‘1’=’1’
‘OR 1=1 –
problem
- allowing characters with special meaning
defense
broken authentication
error in implementation
cross site scripting
defense
- escape before inserting untrusted data
insecure direct object reference
unauthorised change in parameter value to refer to another user account
eg https://www.blablabla.com/customerID=1234 ->1233
security misconfiguration
can be misconfigured at many levels
defence
- principle of least privilege
sensitive data exposure
defence
missing function level access control
function fulfilled without checking o user privileges
defence
cross site request forgery
trick user to execute undesired action when they are already authenticated
defence
using components with known vulnerabilities
defence
unvalidated redirect
defence