Bookmarks tagged [security]
https://hasanuddin-muhamad15.medium.com/create-ipsec-tunnel-between-google-cloud-platform-and-mikrot...
connect
https://snyk.io/blog/10-best-practices-to-containerize-nodejs-web-applications-with-docker/
The following article provides production-grade guidelines for building optimized and secure Node.js Docker images. You’ll find it helpful regardless of the Node.js application you aim to build. This ...
Threat Dragon is a free, open-source threat modeling tool from OWASP. It can be used as a standalone desktop app for Windows and MacOS (Linux coming soon) or as a web application. The desktop app is g...
Falco, the cloud-native runtime security project, is the de facto Kubernetes threat detection engine
https://gchq.github.io/CyberChef/
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.
https://owasp.org/www-project-api-security/
API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).
- tags: security, api-security, guides
https://thecodebarbarian.wordpress.com/2014/09/04/defending-against-query-selector-injection-attacks...
This article shows two simple ways to protect against the attacks described in Hacking NodeJS and MongoDB. One of the them is by...
- tags: mongodb, node.js, expressjs, security
- source code
https://cwe.mitre.org/index.html
CWE™ is a community-developed list of software and hardware weakness types. It serves as a common language, a measuring stick for security tools, and as a baseline for weakness identification, mitigat...
The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by a dedicated international team of volunteers. It can help you automatically find s...
- tags: security, security-tools
- source code
https://github.com/dropbox/zxcvbn
zxcvbn
is a password strength estimator inspired by password crackers. Through pattern matching and conservative estimation, it recognizes and weighs 30k common passwords, common names and surnames ...
https://auth0.com/blog/what-is-and-how-does-single-sign-on-work/
In this post, we will study how SSO authentication is implemented for the web.
https://www.ssl.com/faqs/what-is-an-x-509-certificate/
X.509 is a standard format for public key certificates, digital documents that securely associate cryptographic key pairs with identities such as websites, individuals, or organizations.
Firs...
- tags: security, glossary, ssl-certificate
https://www.ssl.com/guide/pem-der-crt-and-cer-x-509-encodings-and-conversions/
This guide points out the major differences between PEM and DER files and common filename extensions associated with them. It also provides visual examples of each encoding, and illustrates some commo...
- tags: security, ssl-certificate
https://en.wikipedia.org/wiki/Eavesdropping
Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information.
https://www.sciencedirect.com/topics/computer-science/entropy
Entropy, in cyber security, is a measure of the randomness or diversity of a data-generating function. Data with full entropy is completely random and no meaningful patterns can be found. Low entr...
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
- tags: http-proxy, security, security-tools, proxy
- source code
https://www.youtube.com/watch?v=g_aVPdwBTfw
In this talk you'll learn about the latest developments with the OAuth and OIDC specs directly from the standards group. The latest additions to the specs enable richer experiences and better secu...
https://www.softwaresecured.com/what-do-sast-dast-iast-and-rasp-mean-to-developers/
It’s estimated that 90 percent of security incidents result from attackers exploiting known software bugs. Needless to say, squashing those bugs in the development phase of software could reduce the i...
- tags: security, security-tools, terminology
https://owasp.org/www-community/attacks/csrf
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated. With a little help of social engineeri...
https://www.globalsign.com/en/blog/what-is-hsts-and-how-do-i-use-it
HTTP Strict Transport Security (HSTS) is a web server directive that informs user agents and web browsers how to handle its connection through a response header sent at the very beginning and back to ...
- tags: security, http-headers
https://www.microsoft.com/en-us/securityengineering/sdl
The Microsoft SDL introduces security and privacy considerations throughout all phases of the development process, helping developers build highly secure software, address security compliance requirem...
- tags: software-development, security, frameworks
https://owasp.org/www-project-dependency-check/
Dependency-Check is a Software Composition Analysis (SCA) tool that attempts to detect publicly disclosed vulnerabilities contained within a project’s dependencies. It does this by determining if ther...
https://web.dev/same-origin-policy/
The same-origin policy is a browser security feature that restricts how documents and scripts on one origin can interact with resources on another origin.
- tags: security
https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy
The same-origin policy is a critical security mechanism that restricts how a document or script loaded from one origin can interact with a resource from another origin. It helps isolate potentially ma...
- tags: security
https://nodesource.com/blog/nine-security-tips-to-keep-express-from-getting-pwned
Security is really hard to get right. There are so many different factors to consider, countless different ways to break an application.
This is just as true with Express applications as it is with a...
Helmet helps you secure your Express apps by setting various HTTP headers. It’s not a silver bullet, but it can help!
- tags: expressjs, security, helmet
- source code
https://github.com/vasanthk/web-security-basics
Web security concepts. Contribute to vasanthk/web-security-basics development by creating an account on GitHub.
https://www.pingidentity.com/en/company/blog/posts/2019/jwt-security-nobody-talks-about.html
In spite of the popularity of JWTs, their security properties are often misunderstood. To ensure the security of the app, you must fully consider asymmetric signatures, validation beyond signatures, c...
- 📆 published on: 2019-01-10
- tags: jwt, security, encryption
https://haacked.com/archive/2009/04/02/anatomy-of-csrf-attack.aspx/
A Cross-site request forgery attack, also known as CSRF or XSRF (pronounced sea-surf) is the less well known, but equally dangerous, cousin of the Cross Site Scripting (XSS) attack. Yeah, they come fr...
- 📆 published on: 2009-04-02
- tags: security, csrf
- source code
https://blog.atomist.com/security-of-docker-kubernetes/
While not an exhaustive list of suggestions for hardening your Docker containers & Kubernetes clusters, it's a starting point to ensure tighten security.
- 📆 published on: 2019-10-18
- tags: security, docker, kubernetes
https://auth0.com/blog/react-tutorial-building-and-securing-your-first-app/
Introduction to React and its components and routers. Tutorial of how to build a simple Q&A React app - secure backend API with Node.js and Express.
- 📆 published on: 2018-08-28
- tags: reactjs, react-router, node.js, expressjs, axios, authentication, security
- source code
https://secure.wphackedhelp.com/blog/wordpress-malware-redirect-hack-cleanup/
Detect and Clean Malicious Redirects Your site is redirecting due to the presence of infected codes added by hackers. To remove these spam redirects, one has to find malicious codes or malware and rem...
- 📆 published on: 2019-07-03
- tags: wordpress, security
- source code
https://sysdig.com/blog/kubernetes-security-guide/
RBAC, TLS, Security policy, Network policy, etc.
- tags: kubernetes, security
http://scotch.io/tutorials/google-cloud-platform-iii-handling-sensitive-data-in-a-docker-application...
Dealing with sensitive data such as tokens, API keys and passwords In A Docker Application with Kubernetes Secrets
- tags: kubernetes, security
http://linoxide.com/containers/create-use-kubernetes-secrets/
In this article we cover how to create, delete and use secrets in kubernetes. We have included secrets usability as in volumes and environment variables
- tags: kubernetes, security
https://dev.to/petermbenjamin/kubernetes-security-best-practices-hlk
Exploring security best practices around Kubernetes
- tags: kubernetes, security
https://testdriven.io/running-vault-and-consul-on-kubernetes
In the following tutorial we’ll walk you through how to use Minikube to run Kubernetes locally and then we'll run Hashicorp's Vault and Consul on K8s.
- tags: kubernetes, security
http://blog.aquasec.com/topic/kubernetes
Kubernetes Security | The Container and serverless security blog: container security, Kubernetes Security, Docker Security, DevOps Tools, DevSecOps, image scanning, Continuous integration, Runtime pro...
- tags: kubernetes, security
https://github.com/heptio/authenticator
A tool for using AWS IAM credentials to authenticate to a Kubernetes cluster
- tags: kubernetes, security
- source code
from Tigera
Widely adopted open source implementation unifying Kubernetes Network Policy and Istio Application Policy.
- tags: kubernetes, security
OpenID and OAuth for Kubernetes
- tags: kubernetes, security
- source code
https://github.com/appscode/guard
Authenticaton webhook server with support for Github, Gitlab, Google, Azure and LDAP (AD) as identity providers.
- tags: kubernetes, security
- source code
https://github.com/uswitch/kiam
Allows cluster users to associate AWS IAM roles to Pods.
- tags: kubernetes, security
- source code
https://github.com/aquasecurity/kube-bench
The Kubernetes Bench for Security is a Go application that checks whether Kubernetes is deployed according to security best practices.
- tags: kubernetes, security
- source code
https://github.com/aquasecurity/kube-hunter
Hunt for security weaknesses in Kubernetes clusters.
- tags: kubernetes, security
- source code
https://github.com/sysdiglabs/kube-psp-advisor
Help building an adaptive and fine-grained pod security policy.
- tags: kubernetes, security
- source code
https://github.com/jtblin/kube2iam
Provides different AWS IAM roles for pods running on Kubernetes
- tags: kubernetes, security
- source code
kubesec.io
- tags: kubernetes, security
a zero-trust identity-aware access proxy inspired by BeyondCorp.
- tags: kubernetes, security
https://github.com/corneliusweig/rakkess
Kubectl plugin to show an access matrix for all available resources.
- tags: kubernetes, security
- source code
Have visibility into the behavior of your containers & applications with Falco, container native runtime security.
- tags: kubernetes, security
http://www.sysdig.com/product/secure
Container Security that brings together image scanning, run-time protection, and deep forensics to identify vulnerabilities, block threats, enforce compliance, and audit activity across your microserv...
- tags: kubernetes, security
https://www.tigera.io/tigera-secure-ce/
- tags: kubernetes, security
https://www.tigera.io/tigera-secure-ee/
- tags: kubernetes, security
http://github.com/aporeto-inc/trireme-kubernetes
Aporeto integration with Kubernetes Network Policies - aporeto-inc/trireme-kubernetes
- tags: kubernetes, security
- source code
Twistlock is the first comprehensive cloud native cybersecurity platform for hosts, containers, and serverless setups across the DevSecOps lifecycle.
- tags: kubernetes, security
https://github.com/hlandau/acme
ACME (Let's Encrypt) client tool with automatic renewal.
- tags: go, security
- source code
https://github.com/cossacklabs/acra
Network encryption proxy to protect database-based applications from data leaks: strong selective encryption, SQL injections prevention, intrusion detection system.
- tags: go, security
- source code
https://github.com/raja/argon2pw
Argon2 password hash generation with constant-time password comparison.
- tags: go, security
- source code
https://godoc.org/golang.org/x/crypto/acme/autocert
Auto provision Let's Encrypt certificates and start a TLS server.
https://github.com/jaredfolkins/badactor
In-memory, application-driven jailer built in the spirit of fail2ban.
- tags: go, security
- source code
https://github.com/Ullaakut/cameradar
Tool and library to remotely hack RTSP streams from surveillance cameras.
- tags: go, security
- source code
https://github.com/mvmaasakkers/certificates
An opinionated tool for generating tls certificates.
- tags: go, security
- source code
https://github.com/hillu/go-yara
Go Bindings for YARA, the "pattern matching swiss knife for malware researchers (and everyone else)".
- tags: go, security
- source code
https://github.com/dwin/goArgonPass
Argon2 password hash and verification designed to be compatible with existing Python and PHP implementations.
- tags: go, security
- source code
https://github.com/dwin/goSecretBoxPassword
A probably paranoid package for securely hashing and encrypting passwords.
- tags: go, security
- source code
https://bitbucket.org/vahidi/interpol
Rule-based data generator for fuzzing and penetration testing.
JSON Web Cryptography library.
- tags: go, security
- source code
https://github.com/xenolf/lego
Pure Go ACME client library and CLI tool (for use with Let's Encrypt).
- tags: go, security
- source code
https://github.com/awnumar/memguard
A pure Go library for handling sensitive values in memory.
- tags: go, security
- source code
https://github.com/kevinburke/nacl
Go implementation of the NaCL set of API's.
- tags: go, security
- source code
https://github.com/hlandau/passlib
Futureproof password hashing library.
- tags: go, security
- source code
https://github.com/unrolled/secure
HTTP middleware for Go that facilitates some quick security wins.
- tags: go, security
- source code
https://github.com/elithrar/simple-scrypt
Scrypt package with a simple, obvious API and automatic cost calibration built-in.
- tags: go, security
- source code
https://github.com/ssh-vault/ssh-vault
encrypt/decrypt using ssh keys.
- tags: go, security
- source code
https://github.com/adrianosela/sslmgr
SSL certificates made easy with a high level wrapper around acme/autocert.
- tags: go, security
- source code
BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.
https://github.com/rubysec/bundler-audit
Patch-level security verification for Bundler.
- tags: ruby, security
- source code
https://github.com/michenriksen/gitrob
Reconnaissance tool for GitHub organizations.
- tags: ruby, security
- source code
https://github.com/rapid7/metasploit-framework
World's most used penetration testing software.
- tags: ruby, security
- source code
https://github.com/kickstarter/rack-attack
Rack middleware for blocking & throttling abusive requests.
- tags: ruby, security
- source code
https://github.com/sinatra/rack-protection
Rack middleware for protecting against typical Web attacks.
- tags: ruby, security
- source code
https://github.com/twitter/secureheaders
Automatically apply several headers that are related to security, including: Content Security Policy (CSP), HTTP Strict Transport Security (HSTS), X-Frame-Options (XFO), X-XSS-Protection, X-Content-Ty...
- tags: ruby, security
- source code
https://github.com/cure53/DOMPurify
A DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG.
- tags: javascript, security, dom
- source code
https://github.com/leizongmin/js-xss
Sanitize untrusted HTML (to prevent XSS) with a configuration specified by a Whitelist.
- tags: javascript, security
- source code
https://github.com/yahoo/xss-filters
Secure XSS Filters by Yahoo
- tags: javascript, security
- source code
CLI and build-time tool to find & fix vulnerable npm dependencies.
- tags: node.js, security
- source code
https://github.com/simonepri/upash
Unified API for all password hashing algorithms.
- tags: node.js, security
- source code
https://github.com/apps/guardrails
GitHub app that provides security feedback in pull requests.
- tags: node.js, security
- source code
Performs authentication, authorization, cryptography and session management.
https://www.bouncycastle.org/java.html
All-purpose cryptographic library and JCA provider offering a wide range of functions, from basic helpers to PGP/SMIME operations.
Multiplatform, transparent, client-side encryption of files in the cloud.
Runtime application that repels application security risks included in the OWASP Top 10, including SQL injection, cross-site scripting, cross-site request forgery, data tampering, and brute force atta...
- tags: java, security
- source code
JSON web token for Java and Android.
- tags: java, security
- source code
https://github.com/auth0/jwks-rsa-java
JSON Web Key Set parser.
- tags: java, security
- source code
https://github.com/abstractj/kalium
Binding for the Networking and Cryptography (NaCl) library.
- tags: java, security
- source code
Integrated SSO and IDM for browser apps and RESTful web services.
https://github.com/google/keyczar
Easy-to-use, safe encryption framework with key versioning.
- tags: java, security
- source code
https://github.com/square/keywhiz
System for distributing and managing secrets.
- tags: java, security
- source code
https://github.com/GoSimpleLLC/nbvcxz
Advanced password strength estimation.
- tags: java, security
- source code
Provides permission-based authorization services.
https://github.com/pac4j/pac4j
Security engine.
- tags: java, security
- source code
Umbrella project for security and identity management.
https://github.com/tersesystems/securitybuilder
Fluent Builder API for JCA and JSSE classes and especially X.509 certificates.
- tags: java, security
- source code
https://github.com/cossacklabs/themis
Multi-platform high-level cryptographic library provides easy-to-use encryption for protecting sensitive data: secure messaging with forward secrecy, secure data storage (AES256GCM); suits for buildin...
- tags: java, security
- source code
Provides a simple and misuse-proof API for common cryptographic tasks.
- tags: java, security
- source code
Secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets. It handles leasing, key revocation, key rolling, and auditing. Through a unified API, user...
https://github.com/paragonie/awesome-appsec#readme
A curated list of resources for learning about application security - paragonie/awesome-appsec
- tags: awesome-list, security
- source code
https://github.com/sbilly/awesome-security#readme
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security. - sbilly/awesome-security
- tags: awesome-list, security
- source code
https://github.com/apsdehal/awesome-ctf#readme
A curated list of CTF frameworks, libraries, resources and softwares - apsdehal/awesome-ctf
- tags: awesome-list, security, ctf
- source code
https://github.com/rshipp/awesome-malware-analysis#readme
A curated list of awesome malware analysis tools and resources. - rshipp/awesome-malware-analysis
- tags: awesome-list, security, malware, analysis
- source code
https://github.com/ashishb/android-security-awesome#readme
A collection of android security related resources - ashishb/android-security-awesome
- tags: awesome-list, security, android
- source code
https://github.com/carpedm20/awesome-hacking#readme
A curated list of awesome Hacking tutorials, tools and resources - carpedm20/awesome-hacking
- tags: awesome-list, security
- source code
https://github.com/paralax/awesome-honeypots#readme
an awesome list of honeypot resources. Contribute to paralax/awesome-honeypots development by creating an account on GitHub.
- tags: awesome-list, security, honeypot
- source code
https://github.com/meirwah/awesome-incident-response#readme
A curated list of tools for incident response. Contribute to meirwah/awesome-incident-response development by creating an account on GitHub.
- tags: awesome-list, security
- source code
https://github.com/jaredthecoder/awesome-vehicle-security#readme
🚗 A curated list of resources for learning about vehicle security and car hacking. - jaredthecoder/awesome-vehicle-security
- tags: awesome-list, security
- source code
https://github.com/qazbnm456/awesome-web-security#readme
🐶 A curated list of Web Security materials and resources. - qazbnm456/awesome-web-security
- tags: awesome-list, security, web
- source code
https://github.com/meitar/awesome-lockpicking#readme
🔓😎 A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys. - meitar/awesome-lockpicking
- tags: awesome-list, security
- source code
https://github.com/meitar/awesome-cybersecurity-blueteam#readme
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams. - meitar/awesome-cybersecurity-blueteam
- tags: awesome-list, security, cybersecurity
- source code
https://www.infoq.com/articles/istio-security-mtls-jwt
Istio attempts to solve some particularly difficult challenges when running applications in a cloud platform. This article explores the security features of Istio: mTLS and authorization.
Key Tak...
https://www.youtube.com/watch?v=996OiexHze0
Developer Advocate Nate Barbettini breaks down OpenID and OAuth 2.0 in Plain English Find Nate's slides here: [https://speakerdeck.com/nbarbettini/oauth-and-openid-connect-in-plain-english](https://sp...
- 📆 published on: 2018-02-05
- tags: oauth2, openid-connect, security, authentication, authorization
https://github.com/docker/docker-bench-security
The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. - docker/docker-bench-security
- tags: docker, security, devops
- source code
https://github.com/lirantal/awesome-nodejs-security#readme
Awesome Node.js Security resources. Contribute to lirantal/awesome-nodejs-security development by creating an account on GitHub.
- tags: awesome-list, node.js, security
- source code
https://www.youtube.com/watch?v=tj03NRM6SP8
Nice introduction (just introduction) to oauth, openid-connect, possible use for securing microservices...
- 📆 published on: 2015-05-20
- tags: api, security, oauth2, openid-connect, microservices
https://nordicapis.com/why-api-keys-are-not-enough/
API Keys are not security. By design they lack granular control, and there are many vulnerabilities at stake: applications that contain ke...
https://owasp.org/www-project-top-ten/
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a va...
- tags: security
https://en.wikipedia.org/wiki/Public_key_fingerprint
In public-key cryptography, a public key fingerprint is a short sequence of bytes used to identify a longer public key. Fingerprints are created by applying a cryptographic hash function to a public k...
- tags: cryptography, security
ISC 2 CISSP Certified Information Systems Security Professional Official Study Guide and Official Practice Tests Kit
https://www.amazon.com/dp/1119523265/ref=cm_sw_r_cp_apa_EobmBbVYKBPT0
https://developer.okta.com/blog/2018/06/20/what-happens-if-your-jwt-is-stolen
What happens if a JSON Web Token is stolen or compromised? What are the security considerations you need to understand? In this post, we'll look at what JWTs are, and what happens when they're stolen ...
https://tools.ietf.org/html/rfc5280
This specification is one part of a family of standards for the X.509 Public Key Infrastructure (PKI) for the Internet.
- tags: security, cryptography, x509, rfc
http://www.crypto-it.net/eng/index.html
All you need to know about cryptography. Master ciphers and IT security with Crypto-IT website.
- tags: security, cryptography
https://arxiv.org/pdf/1705.09404.pdf
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains. Pub/sub allows event-based information diss...
- 📆 published on: 2016-01-01
- tags: security, publish-subscribe
https://blog.securitycompass.com/publish-subscribe-threat-modeling-11add54f1d07
The decoupled multicast nature of many-to-many communications in the Publish-Subscribe pattern introduces the system components to threats such as unwanted traffic flooding, node compromise attacks, d...
- 📆 published on: 2016-11-21
- tags: publish-subscribe, security
http://niels.nu/blog/2016/java-rsa.html
Shows with Java examples the following:
-
Generating key pairs in Java
-
Encryption / Decryption
-
Sign / Verify
-
Java KeyStore
-
📆 published on: 2016-12-29
-
tags: java, cryptography, security
https://developer.mozilla.org/en-US/docs/Web/Security
The web security oriented articles listed here provide information that may help you secure your site and its code from attacks and data theft.
https://www.comparitech.com/blog/information-security/common-phishing-scams-how-to-avoid/
Phishing for data continues to be a problem, but it's no longer restricted to the internet. Here are the major attack vectors and tactics in use today.
- 📆 published on: 2018-04-28
- tags: security
https://www.youtube.com/watch?v=LPxeYtMDxl0&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7&index=4
What is public key infrastructure? What is trust? Why do we need trust over the Internet? Who should be trusted?
In this video, I will talk about two trust models: Hierarchical Trust Model and dist...
https://www.youtube.com/watch?v=sEkw8ZcxtFk&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7&index=5
What protocol is used between a web server and its clients to establish trust? How do they negotiate and share the secret key? During the handshake process, how public key encryption algorithm is used...
- 📆 published on: 2018-02-11
- tags: security, cryptography, ssl, tls
https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7
A digital signature is equivalent to a handwritten signature in paper, and a digital signature serves three basic purposes. Digital signature is commonly used for software distribution, financial tran...
- tags: security, cryptography
https://stackoverflow.com/questions/18257185/how-does-a-public-key-verify-a-signature/39210591#39210...
Public key encrypts, private key decrypts (encrypting)
Private key encrypts, public key decrypts (signing)
- tags: security, cryptography
Generate short unique ids from integers. Use in url shortening or as unique ids.
- tags: javascript, ruby, go, java, lua, security
- source code
https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-secur...
Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving securi...
https://www.agileit.com/news/data-encryption-methods-secure-cloud/
The cloud enables you to retrieve your files from anywhere with Internet access. Discover modern data encryption methods and more data security tips.
https://blog.cloudsecurityalliance.org/
Cloud Security Alliance Industry Blog
Simple, unobtrusive authentication for Node.js
- tags: node.js, security
- source code
https://en.wikipedia.org/wiki/Role-based_access_control
In computer systems security, role-based access control (RBAC is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employee...
- tags: security, roles, access-control
https://www.splunk.com/pdfs/ebooks/the-essential-guide-to-machine-data.pdf
Whatever you call it, machine data is one of the most underused and undervalued assets of any organization. And, unfortunately, it’s usually kept for some minimum amount of time before being tossed ou...
https://www.sans.org/reading-room/whitepapers/cloud/introduction-securing-cloud-environment-34052
While Cloud services offer flexibility, scalability and economies of scale, there have been commensurate concerns about security. As more data moves from centrally located server storage to the Cloud,...
https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf
This whitepaper is intended for existing and potential customers who are designing the security infrastructure and configuration for applications running in Amazon Web Services (AWS). It provides secu...
https://en.wikipedia.org/wiki/Recovery_point_objective
A recovery point objective (RPO) is defined by business continuity planning. It is the maximum targeted period in which data might be lost from an IT service due to a major incident. The RPO gives...
- tags: cloud, security, business-process
https://en.wikipedia.org/wiki/Recovery_time_objective
The recovery time objective (RTO) is the targeted duration of time and a service level within which a business process must be restored after a disaster (or disruption) in order to avoid unaccepta...
- tags: cloud, security, business-process
http://travistidwell.com/jsencrypt/demo/
Online RSA key generation utility
https://hash.online-convert.com/sha256-generator
Calculate a SHA-256 hash with this free online converter. Additionally create a checksum of your file.
https://www.docusign.com/how-it-works/electronic-signature/digital-signature/digital-signature-faq
Digital signatures, a type of eSignature based on PKI standards, allow users to sign documents in compliance with country/industry-specific regulations.
- tags: security, encryption
https://www.microsoft.com/en-us/safety/online-privacy/phishing-symptoms.aspx
Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of you...
https://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx
Nice explanation of the STRIDE model.
- tags: security
https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html
A firewall is a network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.
https://en.wikipedia.org/wiki/STRIDE_(security)
STRIDE is a threat classification model developed by Microsoft for thinking about computer security threats.[1] It provides a mnemonic for security threats in six categories.
The threat categories ar...
- tags: security
https://en.wikipedia.org/wiki/Ransomware
Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may l...
- tags: security
https://en.wikipedia.org/wiki/Spoofing_attack
In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage.
- tags: networking, security, glossary
https://www.youtube.com/watch?v=wXB-V_Keiu8
RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime factorization, modular exponentiation and time complexity.
- 📆 published on: 2012-07-30
- tags: security, cryptography, encryption, rsa
https://en.wikipedia.org/wiki/Virtual_LAN
A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). VLANs work by applying tags to network packets and handling th...
- tags: security, networking
https://www.youtube.com/watch?v=AQDCe585Lnc
How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from symmetric encryption? I'll explain this in plain English... Nice explanation
- 📆 published on: 2017-10-30
- tags: security, cryptography, encryption
https://haacked.com/archive/2009/06/25/json-hijacking.aspx/
A while back I wrote about a subtle JSON vulnerability which could result in the disclosure of sensitive information. That particular exploit involved overriding the JavaScript Array constructor to di...
https://www.agwa.name/projects/git-crypt/
git-crypt enables transparent encryption and decryption of files in a git repository. Files which you choose to protect are encrypted when committed, and decrypted when checked out. git-crypt lets...
- tags: git, security
- source code
https://nemethgergely.com/building-secure-javascript-applications/
Tips and best practices on how to build secure JavaScript applications
- 📆 published on: 2018-01-18
- tags: javascript, security
https://github.com/sbilly/awesome-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
- tags: security
- source code
https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web applicati...
- tags: security
A bash-tool to store your private data inside a git repository.
- tags: git, security, cvs
- source code
https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet
This article provides a simple positive model for preventing XSS using output escaping/encoding properly. While there are a huge number of...
- tags: security, cheatsheet
https://nemethgergely.com/nodejs-security-overview/
A look at where we are with Node.js security, and what you can do to keep your customer's data safe
https://medium.com/@ryanchenkie_40935/angular-authentication-using-the-http-client-and-http-intercep...
Let’s take a look at how to use Angular’s HttpInterceptor interface to make authenticated HTTP requests. It also suggest how to react in case the token expired.
- 📆 published on: 2017-07-18
- tags: angular, jwt, security, authentication
https://auth0.com/blog/5-steps-to-add-modern-authentication-to-legacy-apps-using-jwts/
Conventional authentication is challenging for today's web applications. Learn about the reasons and how to use JSON Web Tokens (JWT) for modern authentication.
https://blog.angular-university.io/angular-jwt/
A Step-by-Step Guide for learning JSON Web Tokens, including signatures, single page web application User Authentication and Session Management.
https://nodejs.org/api/crypto.html
The crypto
module provides cryptographic functionality that includes a set of wrappers for OpenSSL's hash, HMAC, cipher, decipher, sign and verify functions.
http://www.xorbin.com/tools/sha256-hash-calculator
Easily calculate SHA-256 hash online with free Xorbin.com online SHA-256 generator! SHA-256 is used used for mining Bitcoin.
https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide
The Secure Coding Practices Quick Reference Guide is a technology agnostic set of general software security coding practices, in a comprehensive checklist format, that can be integrated into the devel...
- tags: security
Khan Academy](https://www.khanacademy.org/computing/computer-science/cryptography#modern-crypt) https://www.khanacademy.org/computing/computer-science/cryptography#modern-crypt
A new problem emerges in the 20th century. What happens if Alice and Bob can never meet to share a key in the first place?
- tags: security, cryptography
https://www.owasp.org/index.php/OWASP_Secure_Headers_Project
OWASP Secure Headers Project involves setting headers from the server is easy and often doesn't require any code changes. Once set, they can restrict modern browsers from running into easily preventab...
- tags: security
http://librebooks.org/security-in-a-box/
http://librebooks.org/physical-hacking-techniques/
http://librebooks.org/secure-wireless-networks-for-home-users/
http://fussy.web.fc2.com/algo/algo9-1.htm
http://www.ipa.go.jp/files/000017316.pdf
独立行政法人 情報処理推進機構(IPA) (PDF)
http://www.ipa.go.jp/files/000017320.pdf
独立行政法人 情報処理推進機構(IPA) (PDF)
http://www.mew.org/~kazu/doc/rsa.html
山本和彦
http://x68000.q-e-d.net/~68user/net/
68user
http://www.ipa.go.jp/security/awareness/vendor/programmingv2/index.html
独立行政法人情報処理推進機構(IPA)
http://www.cybersyndrome.net/rsa/
CyberSyndrome
http://www.ipa.go.jp/files/000017319.pdf
独立行政法人 情報処理推進機構(IPA) (PDF)
http://www.troyhunt.com/2011/12/free-ebook-owasp-top-10-for-net.html
- tags: free-programming-books, security
https://www.feistyduck.com/library/openssl-cookbook/
- tags: free-programming-books, security
http://ptgmedia.pearsoncmg.com/images/0131407333/downloads/0131407333.pdf
(PDF)
- tags: free-programming-books, security
https://github.com/MHM5000/pass
- tags: free-programming-books, security
http://cacr.uwaterloo.ca/hac/index.html
- tags: free-programming-books, security
https://unglue.it/work/141611/
- tags: free-programming-books, security
- tags: free-programming-books, security
- tags: free-programming-books, security
https://wiki.ubuntu.com/UncomplicatedFirewall
The Uncomplicated Firewall (ufw
) is a frontend for iptables
and is particularly well-suited for host-based firewalls. ufw
provides a framework for managing netfilter
, as well as a command-line...
https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security
HTTP Strict Transport Security (HSTS) is a web security policy mechanism which helps to protect websites against protocol downgrade attacks and cookie hijacking. It allows web servers to declare t...
These examples are meant for sysadmins who have done this before (and sysadmins are forced to support Windows XP with IE < 9, therefore des3cbc), as an easily copy-pastable example, not for newbies wh...
https://www.linode.com/docs/security/firewalls/configure-firewall-with-ufw
UFW, or uncomplicated firewall, is a frontend for managing firewall rules Arch Linux, Debian or Ubuntu. UFW is used through the command line (although it has GUIs available), and aims to make firewall...
https://docs.mongodb.com/manual/administration/security-checklist/
This documents provides a list of security measures that you should implement to protect your MongoDB installation.
http://idroot.net/tutorials/how-to-change-ssh-port-in-ubuntu/
The Secure Shell (SSH) Protocol by default uses port 22. Accepting this value does not make your system insecure, nor will changing the port provide a significant variance in security. However, changi...