17.2 Attacks against Web Applications
806
17.2.1 Attacks against Authentication
806
17.2.2 Session Hijacking
807
17.2.3 HTML Injection
808
17.2.4 Cross-Site Scripting
811
17.2.5 Session Fixation
815
17.2.6 Cross-Site Request Forgery
815
17.2.7 Directory Traversal
816
17.2.8 Local File Inclusion
817
17.2.9 Remote File Inclusion
819
17.2.11 SQL Injection
821
17.2.13 Advanced SQL Injection: Blind SQL Injection (Boolean)
824
17.2.14 Advanced SQL Injection: Blind SQL Injection (Time)
825
17.2.15 Advanced SQL Injection: Out-of-Band Data Exfiltration
827
17.2.16 Advanced SQL Injection: Error-Based SQL Injection
827
17.2.17 Command Injection
828
17.2.20 Server Side Request Forgery
834
17.2.21 Angular Template Injection
835
17.2.22 Attacks on Object Serialization
835
17.2.23 Vulnerabilities in Content Management Systems
836
17.4 Protection Mechanisms and Defense against Web Attacks
859
17.4.1 Minimizing the Server Signature
860
17.4.2 Turning Off the Directory Listing
860
17.4.3 Restricted Operating System Account for the Web Server
861
17.4.4 Running the Web Server in a “chroot” Environment
861
17.4.5 Disabling Unneeded Modules
861
17.4.6 Restricting HTTP Methods
862
17.4.7 Restricting the Inclusion of External Content
862
17.4.8 Protecting Cookies from Access
863
17.4.9 Server Timeout
863
17.4.10 Secure Socket Layer
863
17.4.11 HTTP Strict Transport Security
864
17.4.12 Input and Output Validation
865
17.4.13 Web Application Firewall
866