Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
26 views
Laravel Cheatsheet
laravel-cheatsheet
Uploaded by
Rizki Kurniawan
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save laravel-cheatsheet For Later
Download
Save
Save laravel-cheatsheet For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
26 views
Laravel Cheatsheet
laravel-cheatsheet
Uploaded by
Rizki Kurniawan
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save laravel-cheatsheet For Later
Carousel Previous
Carousel Next
Save
Save laravel-cheatsheet For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 13
Search
Fullscreen
9123122, 8:39 AM Laravel -OWASP Cheat Sheet Series Laravel Cheat Sheet Introduction This Cheatsheet intends to provide security tips to developers building Laravel applications. It aims to cover all common vulnerabilities and how to ensure that your Laravel applications are secure. ‘The Laravel Framework provides in-built security features and is meant to be secure by default. However it also provides additional flexibility for complex use cases. This means that developers unfamiliar with the inner workings of Laravel may fall into the trap of using complex features in a way that is not secure. This guide is meant to educate developers to avoid common pitfalls and develop Laravel applications in a secure manner. You may also refer the Enlightn Security Documentation, which highlights commen vulneral and good practices on securing Laravel applications. The Basics + Make sure your appis not in debug mode whl APP_DEBUS environment variable to false: in production. To tum off debug mode, set your APP_DEBUG-false * Make sure your application key has been generated. Laravel applications use the app key for ‘symmetric encryption and SHA256 hashes such as cookie encryption, signed URLs, password reset tokens and session data encryption. To generate the app key, you may run the key:generate Artisan command: php artisan key :generate ‘+ Make sure your PHP configuration is secure. You may refer the PHP Configuration Cheat Sheet ‘for more information on secure PHP configuration settings, + Set safe file and directory permissions on your Laravel application. In general, all Larevel directories should be setup with a max permission level cf 775 andnonexecutable files with a max permission level of 664 . Executable files such as Artisan or deployment scripts shouldbe provided with amax permission level of 775. Intps:ifcheatshectseries.owasp.orgicheatsheetsLaravel_Cheat_Sheet.html ans9123122, 8:39 AM Laravel -OWASP Cheat Sheet Series ‘* Make sure your application does nct have vulnerable dependencies. You can check this using ‘the Finlightn Security Checker. Cookie Security and Session Management By default, Laravelis configured in a secure manner. However; if you change your cookie or session ‘configurations, make sure of the folowing: ‘+ Enable the cookie encryption middleware if you use the cookie session store or if you store ‘any kind of data that shouldnot be readable or tampered with by clients. In general, this should be enableduniess your application has avery specific use case that requires disabling this. To enable this middleware, simply add the EneryptGookies middleware tothe web middleware OUP in your App\Http\Kernel class: yee % The application's route middleware groups. * evar array ” protected $middlewareGroups = | web’ => [ \App\Http\Niddleware\EncryptCookies : :class, 7 «+ Enable the 11ttponly attribute on your session cookies via your config/session.php file, so ‘that your session cookies are inaccessible from Javascript: “hetp_only’ => true, ‘¢ Unless you are using sub-domain route registrations in your Laravel application, itis recommended to set the cookie domain attribute to null so that only the same origin (excluding subdomains) can set the cookie. This can be configuredin your config/session.php file: domain’ => null, + Setyour Sanesite cookie attribute to lex oF strict inyour config/session.php file to restrict your cookies to afirst party or same-site context: Intps:ifcheatshectseries.owasp.orgicheatsheetsLaravel_Cheat_Sheet.html9123122, 8:39 AM Laravel -OWASP Cheat Sheet Series ‘same_site' => ‘lax’ ‘© If your application is HTTPS only, it is recommended to set the secure configuration option in your config/session. php file to true to protect against man-in-the-middle attacks. If your application has a combination of HTTP and HTTPS, then it is recommended to set this value to null So that the secure attribute is set automatically when servingHTTPS requests: secure’ => null, + Ensure that you have a low session idle timeout value, OWASP recommends 22-5 mhutes idle timeout for igh value applications and 15-30 minutes for low risk applications. This can be ‘configured in your config/session.php file lifetime’ => 15, You may also refer the Cookie Security Guide to learn more about cookie security and the cookie attributes mentioned above. Authentication Guards and Providers At its core, Laravel's authentication facilities are made up of "guards" and "providers". Guards define how users are authenticated for each request. Providers define how users are retrieved from your persistent storage. Laravel ships with a session guard which maintains state using session storage and cockies, and @ token quatd for API tokens. For providers, Laravel ships witha eloquent provider for retrieving Users using the Eloquent ORM andthe databese provider forretrieving users using the database query builder. Guards and previders can be configured in the config/auth.pho file, Laravel offers the ability to build custom guards and providers as well Starter Kits Laravel offers a wide variety of first party application starter kits that include in-buit authentication features: Intps:ifcheatshectseries.owasp.orgicheatsheetsLaravel_Cheat_Sheet.html ans9123122, 8:39 AM Laravel -OWASP Cheat Sheet Series 1. Laravel Breeze: A simple, minimal implementation of all Laravels authentication features including login, registration, password reset, email verification and password confirmation. 2. Laravel Fortify: A headless authentication backend that includes the above authentication features along with two-factor authentication. 3. Laravel Jetstream: An application starter kit that provides @ UI on top of Laravel Fortify’s authentication features. Itis recommended to use one of these starter kits to ensure robust and secure authentication for your Laravel applications. API Authentication Packages Laravel also offers the following API authertication packages: 11, Passport: An OAuth? authentication provider, 2, Sanctum: An APHtoken authentication provider. Starter kits such as Fortify and Jetstream have in-built support for Sanctum, Mass Assignment Mass assignment is @ common vuherability in modern web applications that use an ORM like Laravets Eloquent ORM. Amass assignments a Vulnerability Where an ORM pattem is abused to madify data items that the user should nct benormallyallawed to modify. Consider the following code: Route: :any(‘/profile’, function (Request Srequest) { Srequest->user()->forceFill(Srequest-al1())->save(); Suser = Srequest->user()->fresh(): return response()->json(conpact(‘user')): sniddlewere( auth’) “The above profile route allows the logged in user to change their profile information. However let's say there isan is_adnin column in the users table. You probably donot want the User to be allawed to change the value of this column. However, the above code allows users to change any column values for their row in the users table. This is amass assignment vulnerability. Intps:ifcheatshectseries.owasp.orgicheatsheetsLaravel_Cheat_Sheet.html ans9123122, 8:39 AM Laravel -OWASP Cheat Sheet Series Laravel has in-built features by defautt to protect against this vulnerability. Make sure of the following to stay secure: + Qualify the allowed parameters that you wish to updateusing Srequest->only or Srequest- >validated ratherthan Srequest->al1. + Donot unguardmodels or setthe Sguarded variableto an empty array. By doing this, you are ‘actually disabling Latavefs in-built mass assignment protection. ‘+ Avoid using methods such as forceFil1 of forceCreate that bypass the protection mechanism. You may however use these methods if you are passingin a validated array of, values. SQL Injection ‘SQL Injection attacks are unfortunstely quite common in modem web applications and entail attackers providing malicious request input data to interfere with SQL queries. This guide covers, SQL injection and how it can be prevented specifically for Laravel applications. You may also refer the SQL Injection Prevention Cheatsheet for more information that is net specific to Laravel. Eloquent ORM SQL Injection Protection By default, Laraver's Eloquent ORM protects against SQL injection by parameterizing queries and using SQL bindings. For instance, consider the following query: use App\odels\User; User::where(‘email’, Semail)->get(); “The code abcve fres the query below: =? select * from ‘users’ where ‘email So, even if Senai is untrusted user input data, you are protected from SQL injection attacks. Raw Query SQL Injection Laravel also offers raw query expressions and raw queties to construct complex queries or database specific queries that arentt supported out of the box. While thisis great for flexibility, you must be carefulto always use SQL data bindings for such queries. Consider the following query: Intps:ifcheatshectseries.owasp.orgicheatsheetsLaravel_Cheat_Sheet.html sitsLaravel -OWASP Cheat Sheet Series use Tlluminate\Support \Facades\DB; use App\Models\User; User : :whereRaw( ‘email Srequest->input(‘emeil').'*')->get(): DB; :table( ‘users’ )->whereRaw(‘email = "'Srequest->input(‘email")."*" oget(); Both lines of code actually execute the same query, which is vulnerable to SQL injection as the query does not use SQL bindings for untrusted user input data. ‘The code above fires the following query: select * from ‘users* where ‘email’ = “value of email query parameter* ‘Always remember to use SQL bindings for request data. We can fix the above code by making the following modification: use App\Models\User; User swhereRaw(‘enail = 2°, [Srequest->input(‘email’)])-=get(); We can even use named SQL bindings like so: use App\Models\User; User::whereRaw("enail = email’, [‘email’ Srequest->input(‘email')])->get(); Column Name SQL Injection You must never allow user input data to dictate column names referenced by your queries. The following queries may be vulnerable to SQL injection use App\Nodels\User; User : :where(Srequest->input('colname’), ‘sonedata’ )->get() User : :query()->orderBy (Srequest->input(' sortBy’))->get(); Itis important to note that even though Laravel has some in-built features such as wrapping column names to protect against the above SQL injection vulnerabilities, some database engines (depending on versions and configurations) may still be vulnerable because binding column names is not supported by databases. Intps:ifcheatshectseries.owasp.orgicheatsheetsLaravel_Cheat_Sheet.html es9123122, 8:39 AM Laravel -OWASP Cheat Sheet Series ‘At the very least, this may result in a mass assignment vulnerability instead of a SQL injection because you may have expected a certain set of column values, but since they are not validated here, the user is free to use other columns as well. Always validate user input for such situations like so: use App\Models\User; Srequest--validate(| ‘sortBy’ => ‘in:price,updated_et']); User : :query()->orderBy (Srequest->validated( | ‘sortBy’ ])-> Validation Rule SQL Injection Certain validation rules have the option of providing database column names. Such rules are vulnerable to SQL injection in the same manner as column name SQL injection because they construct queries in a similar manner. For example, the following code may be vulnerable: use I1luminate\alidation\Rule; Srequest->validate(| Ad’ => Rule: :unique(users")->ignore(Sid, Srequest->input(colnane’)) D: Behind the scenes, the above code triggers the following query: use App\Models\User; Scolname = Srequest->input(‘colnane' ); User: :where(Scolnane, Srequest->input('id"))->where(Scolnane, “<>', $id)- count); Since the column name is dictated by user input, it is similar to column name SQL injection. Cross Site Scripting (XSS) XSS attacks are injection attacks where malicious scripts (such as JavaScript code snippets) are injected into trusted websites. Laravet's Blade templating engine has echo statements {( }} that automatically escape variables using the htmlspecialchars PHP function to pretect against XSS attacks. Intps:ifcheatshectseries.owasp.orgicheatsheetsLaravel_Cheat_Sheet.html m39123122, 8:39 AM Laravel -OWASP Cheat Sheet Series Laravel also offers displaying unescaped data using the unescaped syntax {11 11}. This must not be used on any untrusted data, otherwise your application will be subject to an XSS attack. For instance, if you have something lke this in any of your Blade templates, it would resutt in a vulnerability: {11 request()->input('somedata’) 1!) This, however, is safe to dot {4 request ()->input(’somedata’) }} For cther information on XSS prevention that is nat specific to Laravel, you may refer the Cross Site Scripting Prevention Cheatsheet. Unrestricted File Uploads Unrestricted file upload attacks entail attackers uploading malicious files to compromise web applications. This section describes haw to protect against such attacks while building Laravel applications. You may also refer the File Upload Cheatsheet to learn more. Always Validate File Type and Size Always validate the file type (extension or MIME type) and file size to avoid storage DOS attacks and remote code execution: Srequest->validate(| photo’ => ‘file|size:1@/mines: jpg, bmp, png" D: Storage DOS attacks exploit missing file size validations and upload massive files to cause a denial of service (DOS) by exhausting the disk space. Remote code execution attacks entail first, uploading malicious executable files (such as PHP files) and then, triggering their malicious code by visiting the file URL (if public). Both these attacks can be avoided by simple file validations as mentioned above. Do Not Rely On User Input To Dictate Filenames or Path Intps:ifcheatshectseries.owasp.orgicheatsheetsLaravel_Cheat_Sheet.html ans9123122, 8:39 AM Laravel -OWASP Cheat Sheet Series Ifyour application allows user controlled data to construct the path of a file upload, this may result in overwriting a critical file or storing the file in a bad location. Consider the following code: Route: :post('/upload’, function (Request $request) { Srequest->file(‘file’)->storeds(auth()->id(), Srequest->input( ‘filename’ )) return back(); » This route saves fileto a directory specificto a user ID. Here, werely onthe Filename user input data and this mey result ina vulnerability as the filename could be something like /2/lenane. pdf . This will upload the file in user ID 2's directory instead of the directory pertaining to the current loggedin user. To fix this, we should use the basenane PHP function to strip out any directory information from the filename input data: Route: :post('/upload’, function (Request Srequest) { Srequest->file(' file" )->storess(auth()->1d(), basename(Srequest- >input(' filename" ))); return back(); »: Avoid Processing ZIP or XML Files If Possible XML files can expose your application to a wide variety of attacks such as XXE attacks, the billion laughs attack and others. If you process ZIP files, you may be exposed to zip bomb DOS attacks. Refer the XML Security Cheatsheet andthe File Upload Cheatsheet to leam mare, Path Traversal ‘A path traversal attack aims to access files by manipulating request input data with ../ sequences and variations or by using absolute file paths. If you allow users to download files by filename. you may be exposed to this vulnerability if input data is nct stripped cf ditectory information. Consider the following code: Intps:ifcheatshectseries.owasp.orgicheatsheetsLaravel_Cheat_Sheet.html ons9123122, 8:39 AM Laravel -OWASP Cheat Sheet Series Route: :get(‘/download', function(Request Srequest) { return response()->download(storage-path( ‘content/").$request- >input(" filename’); ) Here, the filename is nct stripped of directory information, so a matformed filename such as 1. .enw Could expose your application credentials to potential attackers. Simfarto unrestricted file uploads, you should use the basenane PHP function to strip out directory information like so: Route: :get('/download', function(Request Srequest) { return response()->download(storage_path( ‘content/*).basename(Srequest- >input(' Filename’ ))) y: Open Redirection Open Redirection attacks in themselves are not that dangerous but they enable phishing attacks. Consider the following code: Route: :get('/redirect’, function (Request Srequest) ( return redirect (Srequest->input(‘url")); n: This code redirects the user to any extemal URL providedby user input. This could enable attackers tocreate seemingly safe URLS like hetps://exanple.con/redi rect? urlehttp://evi1 .coa . For instance, attackers may use a URL of this type to spocf passwordreset emails and lead victims to expose their credentials on the attacker's website. Cross Site Request Forgery (CSRF) Cross-Site Request Forgery (CSRF) i8@ type of attack that ocaurs when a malicious web site, email, blog instant message, or program causes a user's Web browser to perform an unwanted action on atrusted site when the user is authenticated. Laravel provides CSRF protection out-of the-box with the VerifycsrrToken middleware. Generally, if youhave this middlewarein the web middleware group of your App\Http\Kernel class, you should be well protected: Intps:ifcheatshectseries.owasp.orgicheatsheetsLaravel_Cheat_Sheet.html sons9123122, 8:39 AM Laravel -OWASP Cheat Sheet Series yee % The application's route middlewere groups * evar array 7 protected SmiddlewareGroups = [ web! => [ \App\Http\ Middleware \VerifyCsrfToken: :class, Next, for all your Post request forms, you may use the eesrf blade directive to generate the hidden CSRF input token fields:
Equivalent to... -->
For AJAX requests, you can setup the X-CSRF-Token header, Laravel also provides the abilty to exclude certain routes from CSRF protection using the Sexcept variable in your CSRF middleware class. Typically, you would want toexclude only stateless routes (e.g. APIs or webhooks) from CSRF protection. If any other routes are excluded, these may result in CSRF vulnerabilities. Command Injection Command injection vuherabilities involve executing shell commends constructed with unescaped User input data, For example, the following code performs a whois ona user provided domain name’ public function verifyDomain(Request Srequest) 4 exee('whois *.Srequest->input(“domain’)) : ‘The above code is vulnerable as the user data is not escaped properly. To do so, you may use the escapeshellond and/or escapeshellarg PHP functions. Intps:ifcheatshectseries.owasp.orgicheatsheetsLaravel_Cheat_Sheet.html ss9123122, 8:39 AM Laravel -OWASP Cheat Sheet Series Other Injections Object injection, eval code injection and extract variable hijacking attacks involve unserialzing, evalueting orusing the excract function on untrusted user input data. Some examples are: unserialize(Srequest->input(' 4 eval Srequest->input( data’): extract (Srequest-re11()); In general, avoid passing any untrusted input deta to these dangerous functions. Security Headers ‘You should consider adding the following security headers to your web server or Laravel application middleware: + XFrame-Options + X-Content-Type-Options « Strict-Transport Security (for HTTPS only applications) ‘* ContentSecurty-Folicy For more information, refer the OWASP secure headers project. Tools ‘You should consider using Enlightn, @ static and dynamic analysis tool for Larevel applications that has over 45 automated security checks to identify potential security issues. There is both an open ‘source version anda commercial version of Enlightn available. Enightn includes an extensive 45 page documentation on security vulnerabilities and a great way to learn mere on Laravel security is to just review its documentation, You should also use the Enlightn Security Checker or the Local PHP Security Checker, Both of them are open source packages, licensed under the MIT and AGPL licenses respectively, that scan your PHP dependencies for known vulnerabilities using the Security Advisories Database, References Intps:ifcheatshectseries.owasp.orgicheatsheetsLaravel_Cheat_Sheet.html sansLaravel -OWASP Cheat Sheet Series « Laravel Documentation on Authentication * Laravel Documentation on Authorization *# Leravel Documentation on CSRF « Laravel Documentation on Validation «# Enlightn SAST and DAST Tool Laravel Enlightn Security Documentation Intps:ifcheatshectseries.owasp.orgicheatsheetsLaravel_Cheat_Sheet.html
You might also like
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life
From Everand
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life
Mark Manson
4/5 (6125)
Principles: Life and Work
From Everand
Principles: Life and Work
Ray Dalio
4/5 (627)
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
From Everand
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
Brene Brown
4/5 (1148)
Never Split the Difference: Negotiating As If Your Life Depended On It
From Everand
Never Split the Difference: Negotiating As If Your Life Depended On It
Chris Voss
4.5/5 (932)
The Glass Castle: A Memoir
From Everand
The Glass Castle: A Memoir
Jeannette Walls
4/5 (8214)
Grit: The Power of Passion and Perseverance
From Everand
Grit: The Power of Passion and Perseverance
Angela Duckworth
4/5 (631)
Sing, Unburied, Sing: A Novel
From Everand
Sing, Unburied, Sing: A Novel
Jesmyn Ward
4/5 (1253)
The Perks of Being a Wallflower
From Everand
The Perks of Being a Wallflower
Stephen Chbosky
4/5 (8365)
Shoe Dog: A Memoir by the Creator of Nike
From Everand
Shoe Dog: A Memoir by the Creator of Nike
Phil Knight
4.5/5 (860)
Her Body and Other Parties: Stories
From Everand
Her Body and Other Parties: Stories
Carmen Maria Machado
4/5 (877)
Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race
From Everand
Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race
Margot Lee Shetterly
4/5 (954)
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
From Everand
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
Ben Horowitz
4.5/5 (361)
Steve Jobs
From Everand
Steve Jobs
Walter Isaacson
4/5 (2922)
Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
From Everand
Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
Ashlee Vance
4.5/5 (484)
The Emperor of All Maladies: A Biography of Cancer
From Everand
The Emperor of All Maladies: A Biography of Cancer
Siddhartha Mukherjee
4.5/5 (277)
A Man Called Ove: A Novel
From Everand
A Man Called Ove: A Novel
Fredrik Backman
4.5/5 (4972)
Angela's Ashes: A Memoir
From Everand
Angela's Ashes: A Memoir
Frank McCourt
4.5/5 (444)
Brooklyn: A Novel
From Everand
Brooklyn: A Novel
Colm Tóibín
3.5/5 (2061)
The Art of Racing in the Rain: A Novel
From Everand
The Art of Racing in the Rain: A Novel
Garth Stein
4/5 (4281)
The Yellow House: A Memoir (2019 National Book Award Winner)
From Everand
The Yellow House: A Memoir (2019 National Book Award Winner)
Sarah M. Broom
4/5 (100)
The Little Book of Hygge: Danish Secrets to Happy Living
From Everand
The Little Book of Hygge: Danish Secrets to Happy Living
Meik Wiking
3.5/5 (447)
The World Is Flat 3.0: A Brief History of the Twenty-first Century
From Everand
The World Is Flat 3.0: A Brief History of the Twenty-first Century
Thomas L. Friedman
3.5/5 (2283)
Yes Please
From Everand
Yes Please
Amy Poehler
4/5 (1987)
Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America
From Everand
Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America
Gilbert King
4.5/5 (278)
Bad Feminist: Essays
From Everand
Bad Feminist: Essays
Roxane Gay
4/5 (1068)
The Outsider: A Novel
From Everand
The Outsider: A Novel
Stephen King
4/5 (1993)
The Woman in Cabin 10
From Everand
The Woman in Cabin 10
Ruth Ware
3.5/5 (2641)
A Tree Grows in Brooklyn
From Everand
A Tree Grows in Brooklyn
Betty Smith
4.5/5 (1936)
The Sympathizer: A Novel (Pulitzer Prize for Fiction)
From Everand
The Sympathizer: A Novel (Pulitzer Prize for Fiction)
Viet Thanh Nguyen
4.5/5 (125)
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
From Everand
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
Victoria Walters
3.5/5 (692)
Team of Rivals: The Political Genius of Abraham Lincoln
From Everand
Team of Rivals: The Political Genius of Abraham Lincoln
Doris Kearns Goodwin
4.5/5 (1912)
Wolf Hall: A Novel
From Everand
Wolf Hall: A Novel
Hilary Mantel
4/5 (4074)
Fear: Trump in the White House
From Everand
Fear: Trump in the White House
Bob Woodward
3.5/5 (830)
On Fire: The (Burning) Case for a Green New Deal
From Everand
On Fire: The (Burning) Case for a Green New Deal
Naomi Klein
4/5 (75)
Rise of ISIS: A Threat We Can't Ignore
From Everand
Rise of ISIS: A Threat We Can't Ignore
Jay Sekulow
3.5/5 (143)
Manhattan Beach: A Novel
From Everand
Manhattan Beach: A Novel
Jennifer Egan
3.5/5 (901)
John Adams
From Everand
John Adams
David McCullough
4.5/5 (2530)
The Light Between Oceans: A Novel
From Everand
The Light Between Oceans: A Novel
M L Stedman
4.5/5 (790)
Pinning Cheat Sheet
PDF
No ratings yet
Pinning Cheat Sheet
8 pages
Third Party Javascript Management Cheatsheet
PDF
No ratings yet
Third Party Javascript Management Cheatsheet
11 pages
Ruby On Rails Cheatsheet
PDF
No ratings yet
Ruby On Rails Cheatsheet
13 pages
XML Security Cheatsheet
PDF
No ratings yet
XML Security Cheatsheet
22 pages
SQL Injection Prevention Cheatsheet
PDF
No ratings yet
SQL Injection Prevention Cheatsheet
14 pages
Xss Filter Evasion Cheatsheet
PDF
No ratings yet
Xss Filter Evasion Cheatsheet
32 pages
XML External Entity Prevention Cheatsheet
PDF
No ratings yet
XML External Entity Prevention Cheatsheet
18 pages
Server Side Request Forgery Prevention Cheatsheet
PDF
No ratings yet
Server Side Request Forgery Prevention Cheatsheet
12 pages
Transport Layer Protection Cheatsheet
PDF
No ratings yet
Transport Layer Protection Cheatsheet
9 pages
REST Security Cheatsheet
PDF
No ratings yet
REST Security Cheatsheet
9 pages
PHP Configuration Cheatsheet
PDF
No ratings yet
PHP Configuration Cheatsheet
3 pages
Password Storage Cheatsheet
PDF
No ratings yet
Password Storage Cheatsheet
7 pages
TLS Cipher String Cheatsheet
PDF
No ratings yet
TLS Cipher String Cheatsheet
2 pages
Xss Prevention
PDF
No ratings yet
Xss Prevention
10 pages
Secret Management Cheatsheet
PDF
100% (1)
Secret Management Cheatsheet
22 pages
Threat Modeling Cheatsheet
PDF
No ratings yet
Threat Modeling Cheatsheet
12 pages
Virtual Patching Cheatsheet
PDF
No ratings yet
Virtual Patching Cheatsheet
10 pages
SAML Security Cheatsheet
PDF
No ratings yet
SAML Security Cheatsheet
6 pages
Session Management Cheatsheet
PDF
No ratings yet
Session Management Cheatsheet
20 pages
JSON Web Token Cheatsheet For Java
PDF
No ratings yet
JSON Web Token Cheatsheet For Java
14 pages
Injection Prevention Cheatsheet
PDF
No ratings yet
Injection Prevention Cheatsheet
11 pages
Nodejs Security Cheatsheet
PDF
No ratings yet
Nodejs Security Cheatsheet
18 pages
Insecure Direct Object Reference
PDF
No ratings yet
Insecure Direct Object Reference
6 pages
Input Validation Cheatsheet
PDF
No ratings yet
Input Validation Cheatsheet
9 pages
Mass Assignment Cheatsheet
PDF
No ratings yet
Mass Assignment Cheatsheet
7 pages
Logging Vocabulary Cheatsheet
PDF
No ratings yet
Logging Vocabulary Cheatsheet
26 pages
The Unwinding: An Inner History of the New America
From Everand
The Unwinding: An Inner History of the New America
George Packer
4/5 (45)
Little Women
From Everand
Little Women
Louisa May Alcott
4/5 (105)
The Constant Gardener: A Novel
From Everand
The Constant Gardener: A Novel
John le Carré
3.5/5 (109)
Related titles
Click to expand Related Titles
Carousel Previous
Carousel Next
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life
From Everand
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life
Principles: Life and Work
From Everand
Principles: Life and Work
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
From Everand
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
Never Split the Difference: Negotiating As If Your Life Depended On It
From Everand
Never Split the Difference: Negotiating As If Your Life Depended On It
The Glass Castle: A Memoir
From Everand
The Glass Castle: A Memoir
Grit: The Power of Passion and Perseverance
From Everand
Grit: The Power of Passion and Perseverance
Sing, Unburied, Sing: A Novel
From Everand
Sing, Unburied, Sing: A Novel
The Perks of Being a Wallflower
From Everand
The Perks of Being a Wallflower
Shoe Dog: A Memoir by the Creator of Nike
From Everand
Shoe Dog: A Memoir by the Creator of Nike
Her Body and Other Parties: Stories
From Everand
Her Body and Other Parties: Stories
Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race
From Everand
Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
From Everand
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
Steve Jobs
From Everand
Steve Jobs
Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
From Everand
Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
The Emperor of All Maladies: A Biography of Cancer
From Everand
The Emperor of All Maladies: A Biography of Cancer
A Man Called Ove: A Novel
From Everand
A Man Called Ove: A Novel
Angela's Ashes: A Memoir
From Everand
Angela's Ashes: A Memoir
Brooklyn: A Novel
From Everand
Brooklyn: A Novel
The Art of Racing in the Rain: A Novel
From Everand
The Art of Racing in the Rain: A Novel
The Yellow House: A Memoir (2019 National Book Award Winner)
From Everand
The Yellow House: A Memoir (2019 National Book Award Winner)
The Little Book of Hygge: Danish Secrets to Happy Living
From Everand
The Little Book of Hygge: Danish Secrets to Happy Living
The World Is Flat 3.0: A Brief History of the Twenty-first Century
From Everand
The World Is Flat 3.0: A Brief History of the Twenty-first Century
Yes Please
From Everand
Yes Please
Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America
From Everand
Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America
Bad Feminist: Essays
From Everand
Bad Feminist: Essays
The Outsider: A Novel
From Everand
The Outsider: A Novel
The Woman in Cabin 10
From Everand
The Woman in Cabin 10
A Tree Grows in Brooklyn
From Everand
A Tree Grows in Brooklyn
The Sympathizer: A Novel (Pulitzer Prize for Fiction)
From Everand
The Sympathizer: A Novel (Pulitzer Prize for Fiction)
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
From Everand
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
Team of Rivals: The Political Genius of Abraham Lincoln
From Everand
Team of Rivals: The Political Genius of Abraham Lincoln
Wolf Hall: A Novel
From Everand
Wolf Hall: A Novel
Fear: Trump in the White House
From Everand
Fear: Trump in the White House
On Fire: The (Burning) Case for a Green New Deal
From Everand
On Fire: The (Burning) Case for a Green New Deal
Rise of ISIS: A Threat We Can't Ignore
From Everand
Rise of ISIS: A Threat We Can't Ignore
Manhattan Beach: A Novel
From Everand
Manhattan Beach: A Novel
John Adams
From Everand
John Adams
The Light Between Oceans: A Novel
From Everand
The Light Between Oceans: A Novel
Pinning Cheat Sheet
PDF
Pinning Cheat Sheet
Third Party Javascript Management Cheatsheet
PDF
Third Party Javascript Management Cheatsheet
Ruby On Rails Cheatsheet
PDF
Ruby On Rails Cheatsheet
XML Security Cheatsheet
PDF
XML Security Cheatsheet
SQL Injection Prevention Cheatsheet
PDF
SQL Injection Prevention Cheatsheet
Xss Filter Evasion Cheatsheet
PDF
Xss Filter Evasion Cheatsheet
XML External Entity Prevention Cheatsheet
PDF
XML External Entity Prevention Cheatsheet
Server Side Request Forgery Prevention Cheatsheet
PDF
Server Side Request Forgery Prevention Cheatsheet
Transport Layer Protection Cheatsheet
PDF
Transport Layer Protection Cheatsheet
REST Security Cheatsheet
PDF
REST Security Cheatsheet
PHP Configuration Cheatsheet
PDF
PHP Configuration Cheatsheet
Password Storage Cheatsheet
PDF
Password Storage Cheatsheet
TLS Cipher String Cheatsheet
PDF
TLS Cipher String Cheatsheet
Xss Prevention
PDF
Xss Prevention
Secret Management Cheatsheet
PDF
Secret Management Cheatsheet
Threat Modeling Cheatsheet
PDF
Threat Modeling Cheatsheet
Virtual Patching Cheatsheet
PDF
Virtual Patching Cheatsheet
SAML Security Cheatsheet
PDF
SAML Security Cheatsheet
Session Management Cheatsheet
PDF
Session Management Cheatsheet
JSON Web Token Cheatsheet For Java
PDF
JSON Web Token Cheatsheet For Java
Injection Prevention Cheatsheet
PDF
Injection Prevention Cheatsheet
Nodejs Security Cheatsheet
PDF
Nodejs Security Cheatsheet
Insecure Direct Object Reference
PDF
Insecure Direct Object Reference
Input Validation Cheatsheet
PDF
Input Validation Cheatsheet
Mass Assignment Cheatsheet
PDF
Mass Assignment Cheatsheet
Logging Vocabulary Cheatsheet
PDF
Logging Vocabulary Cheatsheet
The Unwinding: An Inner History of the New America
From Everand
The Unwinding: An Inner History of the New America
Little Women
From Everand
Little Women
The Constant Gardener: A Novel
From Everand
The Constant Gardener: A Novel