摘抄——OWASP_Code_Review_Guide-V1_1 (1)

不信任的数据来源

HTTP REQUEST STRINGS

  • request.accepttypes
  • request.browser
  • request.files
  • request.headers
  • request.httpmethod
  • request.item
  • request.querystring
  • request.form
  • request.cookies
  • request.certificate
  • request.rawurl
  • request.servervariables
  • request.url
  • request.urlreferrer
  • request.useragent
  • request.userlanguages
  • request.IsSecureConnection
  • request.TotalBytes
  • request.BinaryRead
  • InputStream
  • HiddenField.Value
  • TextBox.Text
  • recordSet

HTML OUTPUT

  • response.write
  • <% =
  • HttpUtility
  • HtmlEncode
  • UrlEncode
  • innerText
  • innerHTML

INPUT AND OUTPUT STREAMS

  • Java.io
  • java.util.zip
  • java.util.jar
  • FileInputStream
  • ObjectInputStream
  • FilterInputStream
  • PipedInputStream -
  • SequenceInputStream
  • StringBufferInputStream
  • BufferedReader
  • ByteArrayInputStream
  • CharArrayReader
  • File
  • ObjectInputStream
  • PipedInputStream
  • StreamTokenizer
  • getResourceAsStream
  • java.io.FileReader
  • java.io.FileWriter
  • java.io.RandomAccessFile
  • java.io.File
  • java.io.FileOutputStream
  • mkdir
  • renameTo

SERVLETS

  • javax.servlet.*
  • getParameterNames
  • getParameterValues
  • getParameter
  • getParameterMap
  • getScheme
  • getProtocol
  • getContentType
  • getServerName
  • getRemoteAddr
  • getRemoteHost
  • getRealPath
  • getLocalName
  • getAttribute
  • getAttributeNames
  • getLocalAddr
  • getAuthType
  • getRemoteUser
  • getCookies
  • isSecure
  • HttpServletRequest
  • getQueryString
  • getHeaderNames
  • getHeaders
  • getPrincipal
  • getUserPrincipal
  • isUserInRole
  • getInputStream
  • getOutputStream
  • getWriter
  • addCookie
  • addHeader
  • setHeader
  • setAttribute
  • putValue
  • javax.servlet.http.Cookie
  • getName
  • getPath
  • getDomain
  • getComment
  • getMethod
  • getPath
  • getReader
  • getRealPath
  • getRequestURI
  • getRequestURL
  • getServerName
  • getValue
  • getValueNames
  • getRequestedSessionId

CROSS SITE SCRIPTING

  • javax.servlet.ServletOutputStream.print
  • javax.servlet.jsp.JspWriter.print
  • java.io.PrintWriter.print

RESPONSE SPLITTING

  • javax.servlet.http.HttpServletResponse.sendRedirect
  • addHeader, setHeader

REDIRECTION

  • sendRedirect
  • setStatus
  • addHeader, setHeader

SQL & DATABASE

  • 0dbc
  • executeQuery
  • select
  • insert
  • update
  • delete
  • execute
  • executestatement
  • createStatement
  • java.sql.ResultSet.getString
  • java.sql.ResultSet.getObject
  • java.sql.Statement.executeUpdate
  • java.sql.Statement.executeQuery
  • java.sql.Statement.execute
  • java.sql.Statement.addBatch
  • java.sql.Connection.prepareStatement
  • java.sql.Connection.prepareCall

SESSION MANAGEMENT

  • getSession
  • invalidate
  • getId

Ajax and JavaScript

  • document.write
  • eval
  • document.cookie
  • window.location
  • document.URL
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Many organizations have realized that their code is not as secure as they may have thought. Now they're starting the difficult work of verifying the security of their applications. There are four basic techniques for analyzing the security of a software application - automated scanning, manual penetration testing, static analysis, and manual code review. This OWASP Guide is focused on the last of these techniques. Of course, all of these techniques have their strengths, weaknesses, sweet spots, and blind spots. Arguments about which technique is the best are like arguing whether a hammer or saw is more valuable when building a house. If you try to build a house with just a hammer, you'll do a terrible job. More important than the tool is probably the person holding the hammer anyway. The OWASP guides are intended to teach you how to use these techniques. But the fact that they are separate shouldn't be an indicator that they should be used alone. The Development Guide shows your project how to architect and build a secure application, this Code Review Guide tells you how to verify the security of your application's source code, and the Testing Guide shows you how to verify the security of your running application. Security moves too fast for traditional books to be of much use. But OWASP's collaborative environment allows us to keep up to date. There are hundreds of contributors to the OWASP Guides, and we make over a thousand updates to our materials every month. We're committed to making high quality application security materials available to everyone. It's the only way we'll ever make any real progress on application security as a software community.

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值