Free, Top 10 Application Security Vulnerabilities in Web.config Files – Part Two
Free, Top 10 Application Security Vulnerabilities in Web.config Files – Part Two
Some of the most common and dangerous application security vulnerabilities that exist in ASP.NET Web-based applications come not from the C# or VB.NET code that make up its pages and service methods, but instead from the XML code that makes up its Web.config files. Incorrect configurations can open Web sites to application security holes such as session hijacking, Cross-Site Scripting attacks, and even allow the disclosure of private data to attackers.

Bryan Sullivan

Bryan SullivanBryan Sullivan is a development manager at SPI Dynamics (www.spidynamics.com), a Web application security products company. Bryan manages the DevInspect and QAInspect Web security products, which help programmers maintain application security throughout the development and testing process. He has a bachelor's degree in mathematics from Georgia Tech and 12 years of experience in the information technology industry. Bryan is currently coauthoring a book with noted security expert Billy Hoffman on Ajax security, which will be published in summer 2007 by Addison-Wesley.

See All Postings From Bryan Sullivan >>

Place your review about Free, Top 10 Application Security Vulnerabilities in Web.config Files – Part Two




You must me logged in to write a review
Reviews

Be the first to place a review