Security Settings Flashcards
Directory Browsing
- Open IIS Manager through the Server Manager
- Expand Host
- Expand Sites
- Select Default Website
- Select Directory Browsing
- Select Disable (If the option is Enable, directory browsing is already disabled.)
- Select Apply
Ping Flood
- Open Firewall
- In the Inbound/Outbound security rules disable any protocol relating to ICMP echo requests
Logs
- Open IIS Manager through the Server Manager
- Expand Host
- Expand Sites
- Select Default Website
- Select Logging
- Change the Logging directory
FTP
- Open the Remove Roles and Features Wizard through the Server manager
- Select Server Roles
- Expand Web Server (IIS)
- Deselect FTP Server
Loose Lipped Errors
- Open IIS Manager through the Server Manager
- Expand Host
- Expand Sites
- Select Default Website
- Select Error Pages
- Select Edit Feature Settings…
- Select Custom
- Select Okay
SQL Injection
The “striplashes()” function removes backslashes. The “mysql_real_escape_string()” function removes special characters from a string used for an SQL statement. Conditional statements determine that the string is the desired data, clarifying that there is no code in the string.
XSS Reflected
The JavaScript function “htmlspecialchars()” turns special characters that would normally run a malicious function into normal characters that are read as part of a string.
XSS Stored
The JavaScript function “striplashes()” removes backslashes; the “mysql_real_escape_string()” function removes special characters from a string used for an SQL statement; and “htmlspecialchars” turns special characters that would normally run a malicious function into normal characters that are read as part of a string.
Command Execution
If necessary, separate data into smaller sections and make sure it is what’s desired.
General Web/Server Prevention
- Use the JavaScript function to “striplashes()” to remove backslashes from a variable.
- Use the JavaScript function “mysql_real_escape_string()” to remove special characters from a string used for an SQL statement.
- Use the JavaScript function “htmlspecialchars” to turn special characters that would normally run a malicious function into normal characters that are read as part of a string.
- Use the JavaScript function “is_numeric()” to make sure data that is supposed to be numeric only contains numbers.
- You can break apart a variable into smaller chunks during sanitization.
- Use conditional statements to clarify that a variable is what it is intended to be.