Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
78 views
12 pages
Cross Site Leaks Cheatsheet
Cross Site Leaks Cheatsheet
Uploaded by
Rizki Kurniawan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Cross Site Leaks Cheatsheet For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
78 views
12 pages
Cross Site Leaks Cheatsheet
Cross Site Leaks Cheatsheet
Uploaded by
Rizki Kurniawan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Cross Site Leaks Cheatsheet For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 12
Search
Fullscreen
XS Leaks - OWASP Cheat Sheet Series Cross-site leaks Cheat Sheet Introduction ‘This article describes examples of attacks and defenses against cross-site leaks vulnerability (XS Leaks). Since this vulnerability is based on the core mechanism of modern web browsers, it's also called a browser side-channel attack. XS-Leaks attacks seek to exploit the fact of seemingly insignificant information that is exchanged in cross-site communications between sites. This information infers answers to the previously asked questions about the victim's user account. Please take a look at the examples provided below: + Is the user currently logged in? Is the user ID 13372 + Is the user an administrator? + Does the user have a person with a particular email address in their contact list? On the basis of such questions, the attacker might try to deduce the answers, depending on the application's context. In most cases, the answers will be in binary form (yes or no). The impact of this vulnerability depends strongly on the application's risk profile. Despite this, XS Leaks may pose a real threat to user privacy and anonymity. Attack vector ‘The victim meen Wists the ‘tothe site Inthe context ofthe victim's browser and fctve sessions in the application, the Ores Sttocker ter to infer a spect state the vicim to vista ste foaged in of net. whether they have @ thet ts contoled by the Porton named ter fend et cttacker Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html ane9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series + The entire attack takes place on the victim's browser side - just like an XSS attack + In some cases, the victim must remain on the attacker's site longer for the attack to succeed. Same Origin Policy (SOP) Before describing attacks, i's good to understand one of the most critical security mechanisms in browsers - The Same-origin Policy. A few key aspects: + Two URLs are considered as same-origin if their protocol, port, and host are the same + Any origin can send a request to another source, but due to the Same-origin Policy, they will not be able to read the response directly + Same Origin Policy may be relaxed by Cross Origin Resource Sharing (CORS). Origin A Origin B Same origin? https: //exanple.com hetp://sub.example.com No-different hosts hetps://exanple.com hetps://exemple.com:443 Yes! Implicit port in Origin A ‘Although the SOP principle protects us from accessing information in cross-origin communication, XS-Leaks attacks based on residual datacan infer some information. SameSite Cookies ‘The SameStte attribute of a cookie tells the browser whether it shouldindude the cookie in the request from the other site. The SameSite attribute takes the following values: ‘* None -the cookie will be attached to a request from ancther site, but it must be sent over a ‘secure HTTPS channel + Lax -the cookie will be appended tothe request from ancther pageiif the request method is GET and the request is made to top-level navigetion (ie. the navigation changes the addressin the browser top bat) ‘© Strict -the cookie will never be sent from ancther site Itis worth mentioning here the attitude of Chromium based browsers in which cookies without ‘SameSite attribute set by default are treated as Lax. Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html ane9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series Cookies with the appropriate SameSite attribute provide a strong defense against both XS Leaks and also CSRF attacks. How do we know that two sites are SameSite? eTLD https://example.com:443 eTLD+1 Inthe context of the SameSite attribute, we consider the site to be the combination of the TLD (top- level domain) and the domain name before it. For example: Fall URL Site (eTLD#1) https: //example .com:443/d example.com Why are we talking about eTLD#1 and nct just TLD+17 Its because of domains tke .9ithub-io or eu.org . Such parts are nat atomic enough to be compared well. For this reason, alist of effective’ TLDs (eTLDs) was created and can be found here. Sites that have the sameeTLD+1 are considered SameSte, examples: Origin A Origin B SameSite? https: //exanple.com http: //example.con Yes, schemes dorit matter https://evil net https: //exanple.con No differenteTLD+1 hetps://sub.example.co tts: //data.example.co Yes, subdomains dontt a ® matter For mote information about SamSite, see the excellent article Understanding "same-site’. Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html az9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series Attacks using the element ID attribute Elements in the DOM can have an ID attribute that is unique within the dooument. For example button id="pro">Pro account The browser will automatically focus on an element with a given ID if we append a hash to the URL, 9, https://exanple..con#pro. What'smote JavaScript focus event gets fired The attacker may try to embed the application in the iframe with specific source on its own controlled page: ©©@ hpsottackercom
1frane> then add listener in main document for blur event (the opposite of focus). When the victim visits the attackers site, the blur event gets fired. The attacker will be able toconclude that the victim has pro account. Defense Framing protection Ifyou dorttneed other origins to embed your application in a frame, you can consider using one of ‘two mechanisms: ‘+ Content Security Policy frame ancestors directive. Read more about syntax. ‘+ X¢Frame-Options - mainly if you want to support old browsers. Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html ana9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series Setting up framing protection efficiently blocks the ability 1o embed your application in a frame on the attacker-controlled origin and protects from other attacks like Clickjacking. Fetchmetadata (Sec-Fetch-Dest) Sec-FetchyDest header provides us witha piece of information about what is the end goal of the request. This header is included automatically by the browser and is one of the headers within the Fetch Metadeta standard. With Sec-Fetch-Dest you can buld effective cwn resource isolation policies, for example: app.get('/', (req, res) => { if (req.get('Sec-Fetch-Dest') === ‘iframe’) { return res.sendStatus(403) ; > res.send({ message: ‘Hello! v: Di frame (example.comftest) Forbidden example.com Sec-Fetch-Dest: iframe oo App: Server 403 Forbidden Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html siz9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series If you want to use headers from the Fetch Metadata standard, make sure that your users’ browsers ‘support this standard (you can check it here). Also, think about using the appropriate fallback in code if the Sec-Fetch-* header is not included in the request. Attacks based on error events Embedding from resources from other origins is generally allowed. For example, you can embed an image from another origin or even script on your page. What is not permitted is reading cross- origin resource due the SOP policy. When the browser sends a request for a resource, the server processes the request and decides on the response e.g. (200 OK or 404 NOT FOUND). The browser receives the HTTP response and based on that, the appropriate JavaScript event is fired (onload or onerror) In this way, we can try to load resources and, based on the response status, infer whether they exist or not in the context of the logged:in victim. Let's look at the following situation: + GET /api/user/1234 -2000K - currently logged-in user is 1234 because we successfully hoaded resource (onload event fred) «GET /api/user/1235 -401 Unauthorized - 1235 is nct the ID of the currently loggedin user (onerror event will be triggered) Given the above example. an attacker can use JavaScript on his controlled origin to guess the victims ID by enumerating overall the values in a simple loop. function checkId(id) { const script = docunent .createElenent(' script’); script.sre = “https://exanple.con/api/users/${id)” ; script-onload = () => { console. log( Logged user id: S(id}*); a docunent .bedy.appendchs1d(seript) ; + // Generate array [8, const ids = Array(41) f() smap((-, 4) very 40) +0); for (const id of ids) { checkTd( 3d); Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series Note that the attacker here does not care about reading the response body even though it would not be able to dve to solid isolation mechanisms in browsers such as Cross-Origin Resource Blocking. Allit needs is the success information it receives when the onload event fres. Defense ‘SubResource protection In some cases, mechanism of special unique tokens may be implemented to protect our sensitive endpoints. Japi /users/12342token=be93@b8cfbS01 12b9803024200130003 + Token should be long and unique + The backend must correctly validate the token passed in therequest Although it is pretty effective, the solution generates a significant averhead in proper implementation. Fetchmetadata (Sec-Fetch-Site) ‘This header specifies where the request was sent from, and it takes the follow + cross-site © sene-origin © sane-site + none -user directly reached the page Like Seo-Fetch-Dest, this header is automatically appended by the browser to each request and is part of the Fetch Metadata standard. Example usage’ app.get('/api/users/:id', authorization, (req, res) => { Af (req.get('Sec-Fetch-Site') === ‘cross-site') { return res.sendStatus(49a) ; } H/ +++ wore code return res.send({ id: 1234, name: ‘John’, role: ‘admin’ }); YD: Ctoss-Origin-Resource-Policy (CORP) Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html m29723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series If the serverretums this header with the appropriate value, the browser will not load resources from our site or origin (even static images) in ancther application. Possible values: © sane-site © seme-origin © cross-origin Read more about CORP here. Attacks on postMessage communication Sometimes in controlled situations we would like despite SOP to exchange information between different origins. We can use the postMessage mechanism. See below example: // Origin: http://example.con const site = new URLSearchParans(wincow.location.search) .get("site’); // https://evil.com const popup ~ window.open(site); popup.posthessage( secret message! // Origin: https://evil.com window.addEventListener('message’, e alert(e.data) // secret message! Dd: Defense Specify strict targetOrigin ‘To avoid situations like the one above, Where an attacker manages to get the reference for a windowto receive amessage, always specify theexact target0rigin inpostMessage. Passing to the torgetorigin wildcard * causes any origin to receive the message. = http: //example.can 1ew URLSearchParans(window.location.search) .get(‘site’); // https: //evil.com const popup = window.open(site); popup.postMessage( ‘secret message! https: //sub.example com’); // Origin: https://evil.com window.addéventListener('message’, e alert(e.data) // no data! yi Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html anz9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series Frame counting attacks Information about the number of loaded frames in a window can be a source of leakage. Take for example an application that loads search results into a frame. if the results are empty then the frame does nct appear. 000 mpemanpeconenaeuamarniocttnistananysecon Lresult found No results found > window. frames. Aengeh i > window. frames. Length 4 ‘An attacker can get information about the number of loaded frames in a windew by counting the number of frames ina window.franes otject. So finally, an attacker can obtain the email lst and, ina simple loop, open subsequent windows and count the number of frames. If the number of frames in the opened window is equal to 1, the email isin the client's detabase of the application used by the victim. Defense Cross-Origin-Opener-Policy (COOP) Setting this header will prevent cross-otigin documents from opening in the same browsing context group. This solution ensures that document A opening anather document will net have access to the window object. Possible values: © unsafe-none © sane-origin-allow-popups Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html ennXS Leaks - OWASP Cheat Sheet Series In case the server returns for example sane-origin COOP header, the attack fails: const win = window.open( https: //example.con/admin/custoners? search=john'4Gexample.com’); console-log(win.frames.length) // Cannot read property ‘length’ of null Attacks using browser cache Browser cache helps to significantly reduce the time it takes for a page to load when revisited, However, it can also pose a risk of information leakage. If an attacker is able to detect whether a resource was loaded from the cache after the load time, he will be able to draw some conclusions based on it. ‘The principle is simple, a resource loaded from cache memory will load incomparably faster than from the server. @©@ https:fattacker.com
‘An attacker can embed a resource on their site that is only accessible to a user with the admin role. ‘Then, using JavaScript, read the load time of a particular resource and, based on this information, deduce whether the resource is in cache or not. // Threshold above which we consider 2 resource to have loaded fram the server // const THRESHOLD = ... const adminImagePerfEntry = window.performance Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html sone9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series -getEntries() -filter((entry) => entry.name.endsWith( 'admin.svg')); if (adminimagePerfentry.duration < THRESHOLD) { console, 1og('Image loaded from cache! ') + Defense Unpredictable tokens for images This technique is accurate when the user wants the resources to still be cached, while an attacker will not be able to find out about it. Javatars/adnin.svg?token=be93@bdcTbS071eb%a030242ac130003 + Tokens should be unique in context of each user + Ifan attacker cannot guess this token, it will not be able to detect whether the resource was loaded from cache Using the Cache-Control header You can disable the cache mechanism if you accept the degraded performance related to the necessity of reloading resources from the server every time a user visits the site. To disable caching for resources you want to protect, set the response header Cache-Control: no-store. Quick recommendations «+ your application uses cookies, make sure to set the appropriate SameSite attribute, ‘Think about whether youreally want to allow your application to be embedded in frames. tf nct, consider using the mechanisms described in the framing protection section + To strengthen the isolation of your application between other origins, use Cross Origin Resource Policy and Cross Origin Opener Policy headers with appropriate values. ‘* Use the headers available within Fetch Metadsta to build your own resource isolation pol References XS Leaks XS Leaks Wiki Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html sineXS Leaks - OWASP Cheat Sheet Series XS Leaks Attacks & Prevention Fetch Metadata ‘* Fetch Metadata and Isolation Policies ‘Protect your resources from attacks with Fetch Metadata Framing protection ‘+ Preventing framing with policies ‘CSP frame-ancestors' policy SameSite ‘© SameSite cookies explained ‘* SameSite cookies recipes COOP and CORP header ‘* Making your site ‘cross-origin isolated” ‘¢ MDN Web Docs about CORP Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html
You might also like
SIP Final Report - Tanisha Pitalia
PDF
No ratings yet
SIP Final Report - Tanisha Pitalia
17 pages
LF AI & Data Getting Involved Guide
PDF
No ratings yet
LF AI & Data Getting Involved Guide
82 pages
GDPR 2 Logs
PDF
No ratings yet
GDPR 2 Logs
5,212 pages
Opentext™ Documentum™ Rest Services: Reference Guide
PDF
No ratings yet
Opentext™ Documentum™ Rest Services: Reference Guide
1,010 pages
AntCTFxD3CTF 2023 Official Writeups
PDF
100% (1)
AntCTFxD3CTF 2023 Official Writeups
125 pages
RPG Open Access by Example
PDF
No ratings yet
RPG Open Access by Example
34 pages
S H A & D G A L: Igning UB Rchitecture Eployment Uide
PDF
No ratings yet
S H A & D G A L: Igning UB Rchitecture Eployment Uide
31 pages
GET Whitepaper GUTS Tickets Latest
PDF
No ratings yet
GET Whitepaper GUTS Tickets Latest
41 pages
Saugat Adhikari
PDF
No ratings yet
Saugat Adhikari
28 pages
Indonesia Energy Outlook 2021 en
PDF
No ratings yet
Indonesia Energy Outlook 2021 en
120 pages
Ministry of Education: Internet Based Programming
PDF
No ratings yet
Ministry of Education: Internet Based Programming
161 pages
SuperMap Scene SDKs - Unreal Engine (Basic) User Instruction
PDF
100% (1)
SuperMap Scene SDKs - Unreal Engine (Basic) User Instruction
23 pages
Assignment 1
PDF
No ratings yet
Assignment 1
19 pages
Doppelgangers
PDF
No ratings yet
Doppelgangers
23 pages
DI - Natl Security and Tech Regulation
PDF
No ratings yet
DI - Natl Security and Tech Regulation
20 pages
Measure of Central Tendency Project
PDF
No ratings yet
Measure of Central Tendency Project
86 pages
Malindo Air
PDF
No ratings yet
Malindo Air
22 pages
Study - Id128160 - Digital Economy Compass 2022
PDF
No ratings yet
Study - Id128160 - Digital Economy Compass 2022
246 pages
Web Security: Part 1
PDF
No ratings yet
Web Security: Part 1
46 pages
SVG Documentation PDF
PDF
No ratings yet
SVG Documentation PDF
26 pages
I Id Insider Threat: ISACA, Mumbai Chapter
PDF
100% (1)
I Id Insider Threat: ISACA, Mumbai Chapter
53 pages
Asm1 Final
PDF
No ratings yet
Asm1 Final
27 pages
Line Follower Robot & Obstacle Detection Using PID Controller
PDF
No ratings yet
Line Follower Robot & Obstacle Detection Using PID Controller
9 pages
Ali Hadi - Performing Linux Forensic Analysis and Why You Should Care
PDF
No ratings yet
Ali Hadi - Performing Linux Forensic Analysis and Why You Should Care
76 pages
ESSAY WRITING - Fareeha Tahsin Raina, 1811484030, PHI401 Section 6
PDF
No ratings yet
ESSAY WRITING - Fareeha Tahsin Raina, 1811484030, PHI401 Section 6
9 pages
America's Worse Governors!
PDF
No ratings yet
America's Worse Governors!
105 pages
Case Study-02
PDF
No ratings yet
Case Study-02
51 pages
Lightspeed Web Service Developer Guide PDF
PDF
No ratings yet
Lightspeed Web Service Developer Guide PDF
59 pages
Overview Stanford PDF
PDF
No ratings yet
Overview Stanford PDF
113 pages
Java Abstract Class Vs Interface Example Program
PDF
No ratings yet
Java Abstract Class Vs Interface Example Program
13 pages
Final Year Project - 1802160,1802361
PDF
No ratings yet
Final Year Project - 1802160,1802361
24 pages
Tinywow Iot Lab Manual 6768835
PDF
No ratings yet
Tinywow Iot Lab Manual 6768835
33 pages
Cit854 Summary Note - Complete
PDF
No ratings yet
Cit854 Summary Note - Complete
36 pages
Ethics Year2
PDF
No ratings yet
Ethics Year2
15 pages
Angular Unit - 1 (Q & A)
PDF
No ratings yet
Angular Unit - 1 (Q & A)
15 pages
16
PDF
No ratings yet
16
15 pages
Machine Learning - Unit - 1
PDF
100% (1)
Machine Learning - Unit - 1
58 pages
Gesture Controlled Virtual Mouse
PDF
No ratings yet
Gesture Controlled Virtual Mouse
8 pages
Analysis Operational Cost Budget at PT. Mitra Maha Mandiri
PDF
No ratings yet
Analysis Operational Cost Budget at PT. Mitra Maha Mandiri
9 pages
This Content Downloaded From 34.192.2.131 On Tue, 06 Jul 2021 00:05:46 UTC
PDF
No ratings yet
This Content Downloaded From 34.192.2.131 On Tue, 06 Jul 2021 00:05:46 UTC
9 pages
Mumbai Travel Guide
PDF
No ratings yet
Mumbai Travel Guide
5 pages
Analysis of E-Waste Recycling Behavior Based On Survey at A Midwestern PDF
PDF
No ratings yet
Analysis of E-Waste Recycling Behavior Based On Survey at A Midwestern PDF
9 pages
02 Engineering Professionalism PDF
PDF
No ratings yet
02 Engineering Professionalism PDF
13 pages
Bagisto Packaging Best Practices
PDF
No ratings yet
Bagisto Packaging Best Practices
9 pages
The Impact of Indias Cyber Security Law and Cyber Forensic On Building Techno-Centric Smartcity IoT Environment
PDF
No ratings yet
The Impact of Indias Cyber Security Law and Cyber Forensic On Building Techno-Centric Smartcity IoT Environment
9 pages
Precinct Map
PDF
No ratings yet
Precinct Map
1 page
Role of Policy Framework For Disruptive Technologies in The Maritime Domain
PDF
No ratings yet
Role of Policy Framework For Disruptive Technologies in The Maritime Domain
21 pages
Business Analytics
PDF
No ratings yet
Business Analytics
9 pages
Application Usage Risk Report 2010-10
PDF
No ratings yet
Application Usage Risk Report 2010-10
23 pages
GBG Idscan Ieos Web API v4
PDF
No ratings yet
GBG Idscan Ieos Web API v4
16 pages
Se Srs Practical File
PDF
No ratings yet
Se Srs Practical File
22 pages
Practice Paper 1 - Class 12 (2021)
PDF
No ratings yet
Practice Paper 1 - Class 12 (2021)
15 pages
Content Security Policy Cheatsheet
PDF
No ratings yet
Content Security Policy Cheatsheet
11 pages
Unit-5 - Computer Networks-Part 1
PDF
No ratings yet
Unit-5 - Computer Networks-Part 1
12 pages
GovTech Social Contract Agenda
PDF
No ratings yet
GovTech Social Contract Agenda
3 pages
BT Links
PDF
No ratings yet
BT Links
1 page
How A Hacker Can Get Into A Network
PDF
No ratings yet
How A Hacker Can Get Into A Network
7 pages
Daytonford
PDF
No ratings yet
Daytonford
5 pages
Server Side Request Forgery Prevention Cheatsheet
PDF
No ratings yet
Server Side Request Forgery Prevention Cheatsheet
12 pages
Laravel Cheatsheet
PDF
No ratings yet
Laravel Cheatsheet
13 pages
Threat Modeling Cheatsheet
PDF
No ratings yet
Threat Modeling Cheatsheet
12 pages
XML External Entity Prevention Cheatsheet
PDF
No ratings yet
XML External Entity Prevention Cheatsheet
18 pages
Secret Management Cheatsheet
PDF
100% (1)
Secret Management Cheatsheet
22 pages
Strebe Amanda Resume
PDF
No ratings yet
Strebe Amanda Resume
1 page
Xss Filter Evasion Cheatsheet
PDF
No ratings yet
Xss Filter Evasion Cheatsheet
32 pages
Nodejs Security Cheatsheet
PDF
No ratings yet
Nodejs Security Cheatsheet
18 pages
Logging Vocabulary Cheatsheet
PDF
No ratings yet
Logging Vocabulary Cheatsheet
26 pages
Ruby On Rails Cheatsheet
PDF
No ratings yet
Ruby On Rails Cheatsheet
13 pages
XML Security Cheatsheet
PDF
No ratings yet
XML Security Cheatsheet
22 pages
PHP Configuration Cheatsheet
PDF
No ratings yet
PHP Configuration Cheatsheet
3 pages
Session Management Cheatsheet
PDF
No ratings yet
Session Management Cheatsheet
20 pages
TLS Cipher String Cheatsheet
PDF
0% (1)
TLS Cipher String Cheatsheet
2 pages
Cgillenwater Resume
PDF
No ratings yet
Cgillenwater Resume
2 pages
Insecure Direct Object Reference
PDF
No ratings yet
Insecure Direct Object Reference
6 pages
SQL Injection Prevention Cheatsheet
PDF
No ratings yet
SQL Injection Prevention Cheatsheet
14 pages
JSON Web Token Cheatsheet For Java
PDF
No ratings yet
JSON Web Token Cheatsheet For Java
14 pages
Third Party Javascript Management Cheatsheet
PDF
No ratings yet
Third Party Javascript Management Cheatsheet
11 pages
Injection Prevention Cheatsheet
PDF
No ratings yet
Injection Prevention Cheatsheet
11 pages
REST Security Cheatsheet
PDF
No ratings yet
REST Security Cheatsheet
9 pages
Xss Prevention
PDF
No ratings yet
Xss Prevention
10 pages
Transport Layer Protection Cheatsheet
PDF
No ratings yet
Transport Layer Protection Cheatsheet
9 pages
Input Validation Cheatsheet
PDF
No ratings yet
Input Validation Cheatsheet
9 pages
Password Storage Cheatsheet
PDF
No ratings yet
Password Storage Cheatsheet
7 pages
Pinning Cheat Sheet
PDF
No ratings yet
Pinning Cheat Sheet
8 pages
Mass Assignment Cheatsheet
PDF
No ratings yet
Mass Assignment Cheatsheet
7 pages
SAML Security Cheatsheet
PDF
No ratings yet
SAML Security Cheatsheet
6 pages