-
Book Overview & Buying
-
Table Of Contents
The Web Application Hacker's Handbook
By :
Recall the fundamental security problem described in Chapter 1: All user input is untrusted. A huge variety of attacks against web applications involve submitting unexpected input, crafted to cause behavior that was not intended by the application's designers. Correspondingly, a key requirement for an application's security defenses is that the application must handle user input in a safe manner.
Input-based vulnerabilities can arise anywhere within an application's functionality, and in relation to practically every type of technology in common use. “Input validation” is often cited as the necessary defense against these attacks. However, no single protective mechanism can be employed everywhere, and defending against malicious input is often not as straightforward as it sounds.
A typical web application processes user-supplied data in many different forms. Some kinds of input validation may not be feasible or desirable...
Change the font size
Change margin width
Change background colour