Holistic InfoSec For Web Developers, Fascicle 1: VPS, Network, Cloud and Web Applications
Holistic InfoSec For Web Developers, Fascicle 1: VPS, Network, Cloud and Web Applications
Creating and maintaining robust technical solutions that will resist attacks from your adversaries
About the Book
Homepage: https://f1.holisticinfosecforwebdevelopers.com
Contents: https://f1.holisticinfosecforwebdevelopers.com/toc.html
Discounts: If you would like a discount, please email me, letting me know how much you would be willing to pay. The less you pay, the more I may consult with you about your recommendations, direction, etc.
Authors Homepage: binarymist.io
Authors Other Books: https://binarymist.io/publication/kims-selected-publications/
Bundles that include this book
About the Contributors

Editor

Technical Editor
Table of Contents
- Foreword
-
Preface
- Description
- Purpose
- Reason
- Acknowledgements
- Influences
- Introduction
-
7. VPS
- 1. SSM Asset Identification
-
2. SSM Identify Risks
- Forfeit Control thus Security
-
Windows
- PsExec
- Pass The Hash (PTH) suite of Metasploit Modules
- PowerShell
-
PowerShell Exploitation via Executable C/- Psmsf
- PowerShell Payload creation details
- PowerShell Exploitation Evolution
- PowerShell Exploitation via Office Documents C/- Nishang
- Adding Persistence C/- Meterpreter
- Adding Persistence C/- PowerSploit
-
Unnecessary and Vulnerable Services
- Overly Permissive File Permissions, Ownership and Lack of Segmentation
- Weak Password Strategies
- Root Logins
- SSH
- Too Many Boot Options
- Portmap
- EXIM
- NIS
- Rpcbind
- Telnet
- FTP
- NFS
- Lack of Visibility
-
Docker
- Consumption from Registries
- Doppelganger images
- The Default User is Root
-
Docker Host, Engine and Containers
- Namespaces
- Control Groups
- Capabilities
- Linux Security Modules (LSM)
- SecComp
- Read-only Containers
- Application Security
- Using Components with Known Vulnerabilities
- Lack of Backup
- Lack of Firewall
-
3. SSM Countermeasures
- Forfeit Control thus Security
-
Windows
- PsExec and Pass The Hash (PTH)
- PowerShell Exploitation with Persistence
- Minimise Attack Surface by Installing Only what you Need
-
Disable, Remove Services. Harden what is left
- Partitioning on OS Installation
- Apt Proxy Set-up
-
Review Password Strategies
- Consider changing to Bcrypt
- Password GRUB
- Disable Root Logins from All Terminals
-
SSH
- Symmetric Cryptosystems
- Asymmetric Cryptosystems
- Hashing
- SSH Connection Procedure
- Establishing your SSH Servers Key Fingerprint
- Hardening SSH
- Tunnelling SSH
- Disable Boot Options
- Lock Down Partition Mounting
- Portmap
- Disable, Remove Exim
- Remove NIS
- Rpcbind
- Remove Telnet
- Remove FTP
- NFS
-
Lack of Visibility
- Logging and Alerting
-
Web Server Log Management
- System Loggers Reviewed
- Goals
- Environmental Considerations
- Initial Setup
- Improving the Strategy
-
Proactive Monitoring
- Evaluation Criteria
- Goals
- Sysvinit, Upstart, systemd & Runit
- forever
- PM2
- Supervisor
- Monit
- Passenger
- Getting Started with Monit
- Keep Monit Alive
- Keep NodeJS Application Alive
-
Statistics Graphing
- Collectd
- Graphite
- Assembling the Components
-
Host Intrusion Detection Systems (HIDS)
- Tripwire
- RkHunter
- Chkrootkit
- Unhide
- Ossec
- Stealth
- Deeper with OSSEC
- Deeper with Stealth
- Outcomes
- Stealth Up and Running
-
Docker
- Consumption from Registries
- Doppelganger images
- The Default User is Root
-
Hardening Docker Host, Engine and Containers
- Haskell Dockerfile Linter
- Lynis
- Docker Bench
- CoreOS Clair
- Banyanops collector
- Anchore
- TwistLock
- Possible contenders to watch
- Namespaces
- Control Groups
- Capabilities
- Linux Security Modules (LSM)
- Seccomp
- Read-only Containers
-
runC and where it fits in
- Using runC Standalone
- Application Security
- Using Components with Known Vulnerabilities
- Schedule Backups
- Host Firewall
-
Preparation for DMZ
- Confirm DMZ has
- Additional Web Server Preparation
- Post DMZ Considerations
-
4. SSM Risks that Solution Causes
- Forfeit Control thus Security
-
Windows
- PsExec and Pass The Hash (PTH)
- PowerShell Exploitation with Persistence
- Minimise Attack Surface by Installing Only what you Need
-
Disable, Remove Services. Harden what is left
- Partitioning on OS Installation
- Review Password Strategies
- SSH
- Disable Boot Options
- Mounting of Partitions
- Portmap
- Exim
- Remove NIS
- Rpcbind
- Telnet
- FTP
- NFS
-
Lack of Visibility
- Logging and Alerting
- Web Server Log Management
- Proactive Monitoring
- Statistics Graphing
- Host Intrusion Detection Systems (HIDS)
-
Docker
-
- Linux Security Modules (LSM)
-
- Schedule Backups
- Host Firewall
-
5. SSM Costs and Trade-offs
- Forfeit Control thus Security
-
Windows
- PsExec and Pass The Hash (PTH)
- PowerShell Exploitation with Persistence
- Minimise Attack Surface by Installing Only what you Need
-
Disable, Remove Services. Harden what is left
- Partitioning on OS Installation
- Review Password Strategies
- SSH
- Disable Boot Options
- Mounting of Partitions
- Portmap
- Exim
- Remove NIS
- Rpcbind
- Telnet
- FTP
- NFS
-
Lack of Visibility
- Logging and Alerting
- Web Server Log Management
- Proactive Monitoring
- Statistics Graphing
- Host Intrusion Detection Systems (HIDS)
- Docker
- Schedule Backups
- Host Firewall
-
8. Network
- 1. SSM Asset Identification
-
2. SSM Identify Risks
- Fortress Mentality
- Lack of Segmentation
-
Lack of Visibility
- Insufficient Logging
- Lack of Network Intrusion Detection Systems (NIDS)
-
Spoofing
- IP
- ARP (Address Resolution Protocol)
- DNS
- Referrer
- EMail Address
- Website
-
Data Exfiltration, Infiltration
- Ingress and Egress Techniques
- Dropbox
- Physical
- Mobile Phone Data
- DNS, SSH
-
Doppelganger Domains
- Web-sites
- SMTP
- SSH
- Wrongful Trust When Loading Untrusted Web Resources
- TLS Downgrade
-
3. SSM Countermeasures
- Fortress Mentality
- Lack of Segmentation
-
Lack of Visibility
-
Insufficient Logging
- Network Time Protocol (NTP)
- Lack of Network Intrusion Detection Systems (NIDS)
-
Insufficient Logging
-
Spoofing
- IP
- ARP (Address Resolution Protocol)
- DNS
- Referrer
- EMail Address
- Website
-
Data Exfiltration, Infiltration
- Dropbox
- Physical
- Mobile Phone Data
- DNS, SSH
-
Doppelganger Domains
- Web-sites
- SMTP
- SSH
-
Wrongful Trust When Loading Untrusted Web Resources
- Content Security Policy (CSP)
- Sub-resource Integrity (SRI)
-
TLS Downgrade
- HTTP Strict Transport Security (HSTS)
- HTTP Strict Transport Security (HSTS) Preload
-
X.509 Certificate Revocation Evolution
- Initiative 1: Certification Revocation List (CRL)
- Initiative 2: Online Certificate Status Protocol (OCSP)
- One of the Big Problems
- Initiative 3: Welcome to OCSP Stapling
- OCSP Stapling Problem
- Initiative 4: Fix for the OCSP Stapling Problem
-
4. SSM Risks that Solution Causes
- Fortress Mentality
- Lack of Segmentation
-
Lack of Visibility
- Insufficient Logging
- Lack of Network Intrusion Detection Systems (NIDS)
-
Spoofing
- IP
- ARP (Address Resolution Protocol)
- DNS
- Referrer
-
Data Exfiltration, Infiltration
- Dropbox
- Physical
- Mobile Phone Data
- DNS, SSH
- Doppelganger Domains
-
Wrongful Trust When Loading Untrusted Web Resources
- Content Security Policy (CSP)
- Sub-resource Integrity (SRI)
-
TLS Downgrade
- HTTP Strict Transport Security (HSTS)
- HTTP Strict Transport Security (HSTS) Preload
-
5. SSM Costs and Trade-offs
- Fortress Mentality
- Lack of Segmentation
-
Lack of Visibility
- Insufficient Logging
- Lack of Network Intrusion Detection Systems (NIDS)
- Spoofing
-
Data Exfiltration, Infiltration
- Dropbox
- Physical
- Mobile Phone Data
- DNS, SSH
- Doppelganger Domains
-
Wrongful Trust When Loading Untrusted Web Resources
- Content Security Policy (CSP)
- Sub-resource Integrity (SRI)
-
TLS Downgrade
- HTTP Strict Transport Security (HSTS)
- HTTP Strict Transport Security (HSTS) Preload
-
9. Cloud
-
1. SSM Asset Identification
- Productivity
- Competitive Advantage
- Control
- Data
-
2. SSM Identify Risks
-
Shared Responsibility Model
- CSP Responsibility
- CSP Customer Responsibility
- CSP Evaluation
-
Cloud Service Provider vs In-house
- Skills
- EULA
- Giving up Secrets
- Location of Data
- Vendor lock-in
- Possible Single Points of Failure
- Review Other Chapters
- People
- Application Security
- Network Security
-
Violations of Least Privilege
- Machine Instance Single User Root
- CSP Account Single User Root
-
Storage of Secrets
-
Private Key Abuse
- SSH
- TLS
-
Credentials and Other Secrets
- Entered by People (manually)
- Entered by Software (automatically)
-
Private Key Abuse
-
Serverless
- Third Party Services
- Perimeterless
- Functions
- DoS of Lambda Functions
- Infrastructure and Configuration Management
-
AWS
- Password-less sudo
-
Shared Responsibility Model
-
3. SSM Countermeasures
-
Shared Responsibility Model
- CSP Responsibility
- CSP Customer Responsibility
- CSP Evaluation
-
Cloud Service Provider vs In-house
- Skills
- EULA
- Giving up Secrets
- Location of Data
- Vendor lock-in
- Possible Single Points of Failure
- Review Other Chapters
- People
- Application Security
- Network Security
-
Violations of Least Privilege
- Machine Instance Single User Root
- CSP Account Single User Root
-
Storage of Secrets
-
Private Key Abuse
- SSH
- TLS
-
Credentials and Other Secrets
- Entered by People (manually)
- Entered by Software (automatically)
-
Private Key Abuse
-
Serverless
- Third Party Services
- Perimeterless
- Functions
- DoS of Lambda Functions
- Centralised logging of AWS Lambda Functions
- Frameworks
- Infrastructure and Configuration Management
-
AWS
- Password-less sudo
- Additional Tooling
-
Shared Responsibility Model
-
4. SSM Risks that Solution Causes
- Shared Responsibility Model
- CSP Evaluation
- Cloud Service Provider vs In-house
- People
- Application Security
- Network Security
- Violations of Least Privilege
-
Storage of Secrets
-
Private Key Abuse
- SSH
- TLS
-
Credentials and Other Secrets
- Entered by People (manually)
- Entered by Software (automatically)
-
Private Key Abuse
-
Serverless
- Functions
- DoS of Lambda Functions
- Frameworks
- Infrastructure and Configuration Management
-
AWS
- Additional Tooling
-
5. SSM Costs and Trade-offs
- Shared Responsibility Model
- CSP Evaluation
- Cloud Service Provider vs In-house
- People
- Application Security
- Network Security
- Violations of Least Privilege
-
Storage of Secrets
-
Private Key Abuse
- SSH
- TLS
-
Credentials and Other Secrets
- Entered by People (manually)
- Entered by Software (automatically)
-
Private Key Abuse
-
Serverless
- Functions
- DoS of Lambda Functions
- Frameworks
- Infrastructure and Configuration Management
-
AWS
- Additional Tooling
-
1. SSM Asset Identification
-
10. Web Applications
- 1. SSM Asset Identification
-
2. SSM Identify Risks
-
Lack of Visibility
- Insufficient Logging and Monitoring
-
Lack of Input Validation, Filtering and Sanitisation
-
Generic
- What is Validation
- What is Filtering
- What is Sanitisation
- Cross-Site Scripting (XSS)
-
Generic
- Cross-Site Request Forgery (CSRF)
-
Injection
- SQLi
- NoSQLi
- Command Injection
- XML Injection
- XSLT Injection
- XPath Injection
- XQuery Injection
- LDAP Injection
- Captcha
-
Management of Application Secrets
- Datastore Compromise
- Cracking
-
Lack of Authentication, Authorisation and Session Management
- What is Authentication
- What is Authorisation
- Cryptography on the Client (AKA Untrusted Crypto)
- Consuming Free and Open Source
-
Insufficient Attack Protection
- Lack of Active Automated Prevention
-
Lack of Visibility
-
3. SSM Countermeasures
-
Lack of Visibility
-
Insufficient Logging
- Opening a UDP port
- Using Posix
-
Insufficient Monitoring
- Dark Cockpit
- Statistics Graphing
-
Insufficient Logging
-
Lack of Input Validation, Filtering and Sanitisation
-
Generic
- Types of Escaping:
- Example in JavaScript and C#
- Example in JavaScript and NodeJS
- Other things to think about
- Cross-Site Scripting (XSS)
-
Generic
- Cross-Site Request Forgery (CSRF)
-
Injection
- SQLi
- NoSQLi
- Command Injection
- XML Injection
- XSLT Injection
- XPath Injection
- XQuery Injection
- LDAP Injection
-
Captcha
- Types
- Offerings
- Alternative Approaches
- Still Not Cutting it
- User Time Expenditure
- Bot Pot
- Testing
-
Management of Application Secrets
-
Store Configuration in Configuration files
- node-config
- Windows
- Linux
- Least Privilege
- Location
-
Datastore Compromise
- Which KDF to use?
- Caching of Sensitive Data
- Cracking
-
Store Configuration in Configuration files
-
Lack of Authentication, Authorisation and Session Management
- Chosen technologies:
-
Technology and Design Decisions
- Reference Token vs JSON Web Token (JWT)
- IdentityServer3
- MembershipReboot
- External Identity Providers
- Architecture
- Securing Sessions
-
Cryptography on the Client (AKA Untrusted Crypto)
- Web Cryptography API
- user agent
-
[[handle]]
-
CryptoKey
(Web API interface) -
The other two Web Crypto API interfaces
- Crypto (Web API interface)
- SubtleCrypto (Web API interface)
- Cloud Storage
- Protected Data and Document Exchange
-
Consuming Free and Open Source
- Process
- Consumption is Your Responsibility
-
Keeping Safe
- wget, curl, etc
- npm install
- Doppelganger Packages
- Whitelisting Packages via npm Enterprise
-
Tooling
- npm-outdated
- npm-check
- David
- RetireJS
- requireSafe
- bithound
- Node Security Platform (NSP)
- Snyk
- Github
-
Insufficient Attack Protection
- Web Application Firewall (WAF)
- Application Intrusion Detection and Response
- Active Automated Prevention
-
Lack of Visibility
-
4. SSM Risks that Solution Causes
-
Lack of Visibility
- Insufficient Logging and Monitoring
-
Lack of Input Validation, Filtering and Sanitisation
- Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
-
Injection
- SQLi
- NoSQLi
- Command Injection
- XML Injection
- XSLT Injection
- XPath Injection
- XQuery Injection
- LDAP Injection
- Captcha
-
Management of Application Secrets
-
Store Configuration in Configuration files
- node-config
- Windows:
- Linux:
- Least Privilege
- Location
- Datastore Compromise
-
Store Configuration in Configuration files
- Lack of Authentication, Authorisation and Session Management
- Cryptography on the Client (AKA Untrusted Crypto)
-
Consuming Free and Open Source
- Process
- Tooling
- Insufficient Attack Protection
-
Lack of Visibility
-
5. SSM Costs and Trade-offs
-
Lack of Visibility
- Insufficient Logging and Monitoring
-
Lack of Input Validation, Filtering and Sanitisation
- Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
-
Injection
- SQLi
- NoSQLi
- Command Injection
- XML Injection
- XSLT Injection
- XPath Injection
- XQuery Injection
- LDAP Injection
- Captcha
-
Management of Application Secrets
-
Store Configuration in Configuration files
- Windows:
- Linux
- Least Privilege
- Location
- Datastore Compromise
-
Store Configuration in Configuration files
- Lack of Authentication, Authorisation and Session Management
- Cryptography on the Client (AKA Untrusted Crypto)
- Consuming Free and Open Source
- Insufficient Attack Protection
-
Lack of Visibility
-
Additional Resources
- VPS
- Network
- Cloud
- Web Applications
-
Attributions
- Introduction
- VPS
- Network
- Cloud
- Web Applications
The Leanpub 60-day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
See full terms
Do Well. Do Good.
Authors have earned$11,592,641writing, publishing and selling on Leanpub, earning 80% royalties while saving up to 25 million pounds of CO2 and up to 46,000 trees.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers), EPUB (for phones and tablets) and MOBI (for Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them
Top Books
SignalR on .NET 6 - the Complete Guide
Fiodar SazanavetsLearn everything there is to learn about SignalR and how to integrate it with the latest .NET 6 and C# 10 features. Learn how to connect any type of client to SignalR, including plain WebSocket client. Learn how to build interactive applications that can communicate with each other in real time without making excessive calls.
The easiest way to learn design patterns
Fiodar SazanavetsLearn design patterns in the easiest way possible. You will no longer have to brute-force your way through each one of them while trying to figure out how it works. The book provides a unique methodology that will make your understanding of design patterns stick. It can also be used as a reference book where you can find design patterns in seconds.
C++20 - The Complete Guide
Nicolai M. JosuttisAll the new language and library features of C++20 (for those who know previous versions).
The book presents all new language and library features of C++20. Learn how this impacts day-to-day programming, to benefit in practice, to combine new features, and to avoid all new traps.
Buy early, pay less, free updates.
Other books:
Jetpack Compose internals
Jorge CastilloJetpack Compose is the future of Android UI. Master how it works internally and become a more efficient developer with it. You'll also find it valuable if you are not an Android dev. This book provides all the details to understand how the Compose compiler & runtime work, and how to create a client library using them.
Functional event-driven architecture: Powered by Scala 3
Gabriel VolpeExplore the event-driven architecture (EDA) in a purely functional way, mainly powered by Fs2 streams in Scala 3!
Leverage your functional programming skills by designing and writing stateless microservices that scale, powered by stateful message brokers.
OpenIntro Statistics
David Diez, Christopher Barr, Mine Cetinkaya-Rundel, and OpenIntroA complete foundation for Statistics, also serving as a foundation for Data Science.
Leanpub revenue supports OpenIntro (US-based nonprofit) so we can provide free desk copies to teachers interested in using OpenIntro Statistics in the classroom and expand the project to support free textbooks in other subjects.
More resources: openintro.org.
R Programming for Data Science
Roger D. PengThis book brings the fundamentals of R programming to you, using the same material developed as part of the industry-leading Johns Hopkins Data Science Specialization. The skills taught in this book will lay the foundation for you to begin your journey learning data science. Printed copies of this book are available through Lulu.
Ansible for DevOps
Jeff GeerlingAnsible is a simple, but powerful, server and configuration management tool. Learn to use Ansible effectively, whether you manage one server—or thousands.
CCIE Service Provider Version 4 Written and Lab Exam Comprehensive Guide
Nicholas RussoThe service provider landscape has changed rapidly over the past several years. Networking vendors are continuing to propose new standards, techniques, and procedures for overcoming new challenges while concurrently reducing costs and delivering new services. Cisco has recently updated the CCIE Service Provider track to reflect these changes; this book represents the author's personal journey in achieving that certification.
Cronache di Domain-Driven Design
Francesco Strazzullo, Matteo Baglini, Gianluca Padovani, Emanuele DelBono, Marco Consolaro, Alessandro Colla, Uberto Barbini, Alberto Acerbis, Julie Camosseto, DDD Open, and Alberto BrandoliniCronache di Domain-Driven Design: un libro corale in italiano fatto di storie indipendenti tra loro, che sono il risultato dell’applicazione di Domain-Driven Design su progetti reali.
Top Bundles
- #1
Practical FP in Scala + Functional event-driven architecture
2 Books
Practical FP in Scala (A hands-on approach) & Functional event-driven architecture, aka FEDA, (Powered by Scala 3), together as a bundle! The content of PFP in Scala is a requirement to understand FEDA so why not take advantage of this bundle!? - #2
Software Architecture for Developers: Volumes 1 & 2 - Technical leadership and communication
2 Books
"Software Architecture for Developers" is a practical and pragmatic guide to modern, lightweight software architecture, specifically aimed at developers. You'll learn:The essence of software architecture.Why the software architecture role should include coding, coaching and collaboration.The things that you really need to think about before... - #3
All the Books of The Medical Futurist
6 Books
We put together the most popular books from The Medical Futurist to provide a clear picture about the major trends shaping the future of medicine and healthcare. Digital health technologies, artificial intelligence, the future of 20 medical specialties, big pharma, data privacy, digital health investments and how technology giants such as Amazon... - #4
CCIE Service Provider Ultimate Study Bundle
2 Books
Piotr Jablonski, Lukasz Bromirski, and Nick Russo have joined forces to deliver the only CCIE Service Provider training resource you'll ever need. This bundle contains a detailed and challenging collection of workbook labs, plus an extensively detailed technical reference guide. All of us have earned the CCIE Service Provider certification... - #6
Pattern-Oriented Memory Forensics and Malware Detection
2 Books
This training bundle for security engineers and researchers, malware and memory forensics analysts includes two accelerated training courses for Windows memory dump analysis using WinDbg. It is also useful for technical support and escalation engineers who analyze memory dumps from complex software environments and need to check for possible... - #7
Modern C++ Collection
3 Books
Get All about Modern C++C++ Standard Library, including C++20Concurrency with Modern C++, including C++20C++20Each book has about 200 complete code examples. Updates are included. When I update one of the books, you immediately get the updated bundle. You can expect significant updates to each new C++ standard (C++23, C++26, .. ) and also... - #10
Growing Agile: The Complete Coach's Guide
7 Books
Growing Agile: Coach's Guide Series This bundle provides a collection of training and workshop plans for a variety of agile topics. The series is aimed at agile coaches, trainers and ScrumMasters who often find themselves needing to help teams understand agile concepts. Each book in the series provides the plans, slides, handouts and activity...