Input Threats & Validation Flashcards
What is a primary attack method
Inputting data - trust nothing that is inputted, data may be unknown, untrusted, insecure or malicious
What are injection attacks
Putting data into a web app - malicious code within an input
SQL Injection
Insertion or injection of an SQL query into the input data provided by a user to an application. It can read/modify data in a database.
Out of bound read
Can access data out of the range of the buffer, means other maybe sensitive information can be affected
Out of bounds write
Can modify data out of the range of the buffer
Buffer overflow occurs
Buffer overflow
Happens in out of bounds write
When a programmer attempted to put more data in a buffer than it can hold or when a program attempts to put data in a memory area past a buffer
Whitelist(input validation)
Write what data is allowed, everything else is denied by default
Blacklist(input validation)
write what data isn’t allowed, everything else is accepted by default
How to implement input validation?
Pattern matching, regular expressions, custom validation
How can we ensure data input into a web form by a user is of the correct type
built-in data fields