The Artima Developer Community
Sponsored Link

.NET Buzz Forum
Eight ASP.NET Security Tips

0 replies on 1 page.

Welcome Guest
  Sign In

Go back to the topic listing  Back to Topic List Click to reply to this topic  Reply to this Topic Click to search messages in this forum  Search Forum Click for a threaded view of the topic  Threaded View   
Previous Topic   Next Topic
Flat View: This topic has 0 replies on 1 page
Michael Mello

Posts: 100
Nickname: knarf
Registered: May, 2004

Michael Mello is .NET Web Developer
Eight ASP.NET Security Tips Posted: Jun 13, 2004 3:59 PM
Reply to this message Reply

This post originated from an RSS feed registered with .NET Buzz by Michael Mello.
Original Post: Eight ASP.NET Security Tips
Feed Title: melloblog
Feed URL: http://www.thauvin.net/errorpage.htm?aspxerrorpath=/Default.aspx
Feed Description: .NET and Everything After.
Latest .NET Buzz Posts
Latest .NET Buzz Posts by Michael Mello
Latest Posts From melloblog

Advertisement
ASP.NET Security: 8 Ways to Avoid Attack touches on some of the important steps to securing your .NET driven website.

  • Cross-site Scripting

  • SQL Injection

  • Validate your User Inputs

  • Use Hashing to Store your Passwords

  • Encrypt Sensitive Data

  • Store Secure Information in the Registry

  • Housekeeping before Deploying - Disable trace, , etc

  • Use Sessions, but Not Cookie-less Sessions



A few notes about the article:

XSS (Cross-site Scripting) is something that is very important, especially for forum and blog sites.  Web Developers are to assume the worse about their visitors, and should always try to encode user input when necessary.  I found it interesting that there were reports of a loophole, even though ASP.NET has a built in mechanism to prevent XSS.  The loophole consisted of a null character (%00), which if inserted into the <Script> tag, could bypass detection.  (This has since been hot-fixed, but nevertheless demonstrates the importance of the Server.HtmlEncode() method).

When talking about SQL Injection attacks, the author gave examples of using the Parameters object to combat any attacks, but never mentioned Stored Procedures.  Although using Parameter queries is head and shoulders above inline SQL, I think it's better practice to use SP's, if the situation allows.

Lastly, the author mentions the use of Hashing to store passwords instead of plain text.  He goes on to say:

"This is a dangerous thing to do; if your SQL Server is compromised, you run the risk of exposing all the passwords. (There are those who argue that if your database server is compromised, it doesn't matter how you save your passwords?they are no longer secure)."

Ok, great, Hash away.  But there isn't much explanation of WHY the argument of, "Well, your DB has been compromised, so you're SOL either way" is wrong.  Not that I feel hashing is a waste of time, because it isn't; but I'd like to hear a better explanation of WHY it isn't.

Read: Eight ASP.NET Security Tips

Topic: Don't try this at home Previous Topic   Next Topic Topic: Was haben Quake, Bernhard Riemann und die Diplomaten gemeinsam?

Sponsored Links



Google
  Web Artima.com   

Copyright © 1996-2019 Artima, Inc. All Rights Reserved. - Privacy Policy - Terms of Use