-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
CompTIA PenTest+ Study Guide
By :
We’ve now examined web application vulnerabilities extensively from the perspective of an attacker. There are, indeed, many ways that an attacker can exploit security flaws to compromise the security of applications. Now let’s flip our perspective and look at some of the unsecure code practices that developers might engage in, inadvertently undermining application security.
Comments are an important part of any good developer’s workflow. Placed strategically throughout code, they provide documentation of design choices, explain workflows, and offer details crucial to other developers who may later be called upon to modify or troubleshoot the code. When placed in the right hands, comments are crucial.
However, comments can also provide attackers with a road map explaining how code works. In some cases, comments may even include critical security details that should remain secret. Developers should take steps to ensure...
Change the font size
Change margin width
Change background colour