ASP. NET Core 5 Secure Coding Cookbook Practical Recipes for Tackling Vulnerabilities in Your ASP. NET Web Applications.

Saved in:
Bibliographic Details
Main Author: Canlas, Roman
Other Authors: Price, Ed
Format: Electronic eBook
Language:English
Published: Birmingham : Packt Publishing, Limited, 2021.
Subjects:
Online Access: Full text (Emmanuel users only)
Table of Contents:
  • Cover
  • Copyright
  • Foreword
  • Contributors
  • Table of Contents
  • Preface
  • Chapter 1: Secure Coding Fundamentals
  • Technical requirements
  • Input validation
  • Enabling whitelist validation using validation attributes
  • Getting ready
  • How to do it...
  • How it works...
  • Whitelist validation using the FluentValidation library
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • See also...
  • Syntactic and semantic validation
  • Creating a custom validation attribute to implement semantic validation
  • Getting ready
  • How to do it...
  • How it works...
  • Input sanitization
  • Getting ready
  • How to do it...
  • How it works...
  • Input sanitization using the HTMLSanitizer library
  • Getting ready
  • How to do it...
  • How it works...
  • Output encoding
  • Output encoding using HtmlEncoder
  • Getting ready
  • How to do it...
  • How it works...
  • Output encoding using UrlEncoder
  • Getting ready
  • How to do it...
  • How it works...
  • Output encoding using JavascriptEncoder
  • Getting ready
  • How to do it...
  • How it works...
  • Protecting sensitive data using the Data Protection API
  • Getting ready
  • How to do it...
  • How it works...
  • See also
  • Chapter 2: Injection Flaws
  • Technical requirements
  • What is SQL injection?
  • Fixing SQL injection with Entity Framework
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • Fixing SQL injection in ADO.NET
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • Fixing NoSQL injection
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • Fixing command injection
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • Fixing LDAP injection
  • Getting ready
  • How to do it...
  • How it works...
  • Fixing XPath injection
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • Chapter 3: Broken Authentication
  • Technical requirements
  • Fixing the incorrect restrictions of excessive authentication attempts
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • Fixing insufficiently protected credentials
  • Getting ready
  • How to do it...
  • How it works...
  • Fixing user enumeration
  • Getting ready
  • How to do it...
  • How it works...
  • Fixing weak password requirements
  • Getting ready
  • How to do it...
  • How it works...
  • Fixing insufficient session expiration
  • Getting ready
  • How to do it...
  • How it works...
  • Chapter 4: Sensitive Data Exposure
  • Technical requirements
  • Fixing insufficient protection of data in transit
  • Getting ready
  • How to do it...
  • How it works...
  • Fix missing HSTS headers
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • Fixing weak protocols
  • Getting ready
  • How to do it...
  • How it works...
  • Fixing hardcoded cryptographic keys
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • Disabling caching for critical web pages
  • Getting ready
  • How to do it...
  • How it works...