How to Secure From These Attack
How to Secure These Attack?
Client Side Validation: Do not accept special characters from user in input fields.
Server Side : Stored Procedures Reference: Owasp top 10 www.owasp.org
Home Work: 5 Ways to protect yourwebsite from Bypass Authentication SQL Injection Attack -> Word Document -> PDF and pdf you have to send me by 12.00AM
Insecure Direct Object Reference: A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, or database key. Without an access control check or other protection, attackers can manipulate these references to access unauthorized data.
Sensitive Data Exposure: Many web applications do not properly protect sensitive data, such as credit cards, tax IDs, and authentication credentials. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data deserves extra protection such as encryption at rest or in transit, as well as special precautions when exchanged with the browser.
Security in REST: When data is stored in the server and not moving it should be encrypted. Ecnryption of the data exchange in transit How to Secure from Union Based Injection
- Never allow GET methods in the website
- Validate database error
- Redirect every non indexed error to 403.html page.
- Use Stored Procedures
- Just follow above 4 ;)