Holistic InfoSec For Web Developers, Fascicle 1: VPS, Network, Cloud and Web Applications
Holistic InfoSec For Web Developers, Fascicle 1: VPS, Network, Cloud and Web Applications
$22.99
Minimum price
$22.99
Suggested price
Holistic InfoSec For Web Developers, Fascicle 1: VPS, Network, Cloud and Web Applications

This book is 98% complete

Last updated on 2018-12-15

About the Book

Homepage: https://f1.holisticinfosecforwebdevelopers.com

Contents: https://f1.holisticinfosecforwebdevelopers.com/toc.html

Discounts: If you would like a discount, please email me, letting me know how much you would be willing to pay. The less you pay, the more I may consult with you about your recommendations, direction, etc.

Authors Homepage: binarymist.io

Authors Other Books: https://binarymist.io/publication/kims-selected-publications/

About the Author

Kim Carter
Kim Carter

Technologist / Engineer, Information Security Professional, Entrepreneur and the founder of BinaryMist Ltd. OWASP NZ Chapter Leader. Certified Scrum Master. Facilitator, mentor and motivator of cross functional, self managing teams. With a solid 16 years of commercial industry experience across many domains, Kim enjoys teaching others how to apply information security to their Agile processes, bringing the security focus up front where it's the cheapest to implement, increasing profit and reducing costs. Organiser of two information security conferences (OWASP NZ Day and Christchurch Hacker Con), International trainer, speaker, and Software Engineering Radio podcast host, focusing on:

  1. Software and network architecture
  2. Web development and engineering
  3. Information security

Kim is also a regular blog poster at binarymist.io/blog. Kim loves designing and creating robust software and networks, breaking software and networks, then fixing them and helping organisations increase productivity.

Kim's Other Books: binarymist.io/publication/kims-selected-publications/

Bundles that include this book

Holistic InfoSec For Web Developers, Fascicle 0: Physical and People
Holistic InfoSec For Web Developers, Fascicle 1: VPS, Network, Cloud and Web Applications
Holistic InfoSec For Web Developers, Fascicle 2: Mobile and IoT
3 Books
$51.97
Suggested Price
$28.97
Bundle Price
Essential Node.js Security
Holistic InfoSec For Web Developers, Fascicle 0: Physical and People
Holistic InfoSec For Web Developers, Fascicle 1: VPS, Network, Cloud and Web Applications
Holistic InfoSec For Web Developers, Fascicle 2: Mobile and IoT
4 Books
$78.97
Suggested Price
$35.00
Bundle Price

About the Contributors

Leanne Carter
Leanne Carter

Editor

Russ McRee
Russ McRee

Technical Editor

Table of Contents

  • Foreword
  • Preface
    • Description
    • Purpose
    • Reason
    • Acknowledgements
    • Influences
  • Introduction
  • 7. VPS
    • 1. SSM Asset Identification
    • 2. SSM Identify Risks
      • Forfeit Control thus Security
      • Windows
        • PsExec
        • Pass The Hash (PTH) suite of Metasploit Modules
        • PowerShell
        • PowerShell Exploitation via Executable C/- Psmsf
          • PowerShell Payload creation details
        • PowerShell Exploitation Evolution
        • PowerShell Exploitation via Office Documents C/- Nishang
        • Adding Persistence C/- Meterpreter
        • Adding Persistence C/- PowerSploit
      • Unnecessary and Vulnerable Services
        • Overly Permissive File Permissions, Ownership and Lack of Segmentation
        • Weak Password Strategies
        • Root Logins
        • SSH
        • Too Many Boot Options
        • Portmap
        • EXIM
        • NIS
        • Rpcbind
        • Telnet
        • FTP
        • NFS
      • Lack of Visibility
      • Docker
        • Consumption from Registries
        • Doppelganger images
        • The Default User is Root
        • Docker Host, Engine and Containers
          • Namespaces
          • Control Groups
          • Capabilities
          • Linux Security Modules (LSM)
          • SecComp
          • Read-only Containers
        • Application Security
      • Using Components with Known Vulnerabilities
      • Lack of Backup
      • Lack of Firewall
    • 3. SSM Countermeasures
      • Forfeit Control thus Security
      • Windows
        • PsExec and Pass The Hash (PTH)
        • PowerShell Exploitation with Persistence
      • Minimise Attack Surface by Installing Only what you Need
      • Disable, Remove Services. Harden what is left
        • Partitioning on OS Installation
        • Apt Proxy Set-up
        • Review Password Strategies
          • Consider changing to Bcrypt
          • Password GRUB
        • Disable Root Logins from All Terminals
        • SSH
          • Symmetric Cryptosystems
          • Asymmetric Cryptosystems
          • Hashing
          • SSH Connection Procedure
          • Establishing your SSH Servers Key Fingerprint
          • Hardening SSH
          • Tunnelling SSH
        • Disable Boot Options
        • Lock Down Partition Mounting
        • Portmap
        • Disable, Remove Exim
        • Remove NIS
        • Rpcbind
        • Remove Telnet
        • Remove FTP
        • NFS
      • Lack of Visibility
        • Logging and Alerting
        • Web Server Log Management
          • System Loggers Reviewed
          • Goals
          • Environmental Considerations
          • Initial Setup
          • Improving the Strategy
        • Proactive Monitoring
          • Evaluation Criteria
          • Goals
          • Sysvinit, Upstart, systemd & Runit
          • forever
          • PM2
          • Supervisor
          • Monit
          • Passenger
          • Getting Started with Monit
          • Keep Monit Alive
          • Keep NodeJS Application Alive
        • Statistics Graphing
          • Collectd
          • Graphite
          • Assembling the Components
        • Host Intrusion Detection Systems (HIDS)
          • Tripwire
          • RkHunter
          • Chkrootkit
          • Unhide
          • Ossec
          • Stealth
          • Deeper with OSSEC
          • Deeper with Stealth
          • Outcomes
          • Stealth Up and Running
      • Docker
        • Consumption from Registries
        • Doppelganger images
        • The Default User is Root
        • Hardening Docker Host, Engine and Containers
          • Haskell Dockerfile Linter
          • Lynis
          • Docker Bench
          • CoreOS Clair
          • Banyanops collector
          • Anchore
          • TwistLock
          • Possible contenders to watch
          • Namespaces
          • Control Groups
          • Capabilities
          • Linux Security Modules (LSM)
          • Seccomp
          • Read-only Containers
        • runC and where it fits in
          • Using runC Standalone
        • Application Security
      • Using Components with Known Vulnerabilities
      • Schedule Backups
      • Host Firewall
      • Preparation for DMZ
        • Confirm DMZ has
        • Additional Web Server Preparation
      • Post DMZ Considerations
    • 4. SSM Risks that Solution Causes
      • Forfeit Control thus Security
      • Windows
        • PsExec and Pass The Hash (PTH)
        • PowerShell Exploitation with Persistence
      • Minimise Attack Surface by Installing Only what you Need
      • Disable, Remove Services. Harden what is left
        • Partitioning on OS Installation
        • Review Password Strategies
        • SSH
        • Disable Boot Options
        • Mounting of Partitions
        • Portmap
        • Exim
        • Remove NIS
        • Rpcbind
        • Telnet
        • FTP
        • NFS
      • Lack of Visibility
        • Logging and Alerting
        • Web Server Log Management
        • Proactive Monitoring
        • Statistics Graphing
        • Host Intrusion Detection Systems (HIDS)
      • Docker
        •  
          • Linux Security Modules (LSM)
      • Schedule Backups
      • Host Firewall
    • 5. SSM Costs and Trade-offs
      • Forfeit Control thus Security
      • Windows
        • PsExec and Pass The Hash (PTH)
        • PowerShell Exploitation with Persistence
      • Minimise Attack Surface by Installing Only what you Need
      • Disable, Remove Services. Harden what is left
        • Partitioning on OS Installation
        • Review Password Strategies
        • SSH
        • Disable Boot Options
        • Mounting of Partitions
        • Portmap
        • Exim
        • Remove NIS
        • Rpcbind
        • Telnet
        • FTP
        • NFS
      • Lack of Visibility
        • Logging and Alerting
        • Web Server Log Management
        • Proactive Monitoring
        • Statistics Graphing
        • Host Intrusion Detection Systems (HIDS)
      • Docker
      • Schedule Backups
      • Host Firewall
  • 8. Network
    • 1. SSM Asset Identification
    • 2. SSM Identify Risks
      • Fortress Mentality
      • Lack of Segmentation
      • Lack of Visibility
        • Insufficient Logging
        • Lack of Network Intrusion Detection Systems (NIDS)
      • Spoofing
        • IP
        • ARP (Address Resolution Protocol)
        • DNS
        • Referrer
        • EMail Address
        • Website
      • Data Exfiltration, Infiltration
        • Ingress and Egress Techniques
        • Dropbox
        • Physical
        • Mobile Phone Data
        • DNS, SSH
      • Doppelganger Domains
        • Web-sites
        • SMTP
        • SSH
      • Wrongful Trust When Loading Untrusted Web Resources
      • TLS Downgrade
    • 3. SSM Countermeasures
      • Fortress Mentality
      • Lack of Segmentation
      • Lack of Visibility
        • Insufficient Logging
          • Network Time Protocol (NTP)
        • Lack of Network Intrusion Detection Systems (NIDS)
      • Spoofing
        • IP
        • ARP (Address Resolution Protocol)
        • DNS
        • Referrer
        • EMail Address
        • Website
      • Data Exfiltration, Infiltration
        • Dropbox
        • Physical
        • Mobile Phone Data
        • DNS, SSH
      • Doppelganger Domains
        • Web-sites
        • SMTP
        • SSH
      • Wrongful Trust When Loading Untrusted Web Resources
        • Content Security Policy (CSP)
        • Sub-resource Integrity (SRI)
      • TLS Downgrade
        • HTTP Strict Transport Security (HSTS)
        • HTTP Strict Transport Security (HSTS) Preload
        • X.509 Certificate Revocation Evolution
          • Initiative 1: Certification Revocation List (CRL)
          • Initiative 2: Online Certificate Status Protocol (OCSP)
          • One of the Big Problems
          • Initiative 3: Welcome to OCSP Stapling
          • OCSP Stapling Problem
          • Initiative 4: Fix for the OCSP Stapling Problem
    • 4. SSM Risks that Solution Causes
      • Fortress Mentality
      • Lack of Segmentation
      • Lack of Visibility
        • Insufficient Logging
        • Lack of Network Intrusion Detection Systems (NIDS)
      • Spoofing
        • IP
        • ARP (Address Resolution Protocol)
        • DNS
        • Referrer
      • Data Exfiltration, Infiltration
        • Dropbox
        • Physical
        • Mobile Phone Data
        • DNS, SSH
      • Doppelganger Domains
      • Wrongful Trust When Loading Untrusted Web Resources
        • Content Security Policy (CSP)
        • Sub-resource Integrity (SRI)
      • TLS Downgrade
        • HTTP Strict Transport Security (HSTS)
        • HTTP Strict Transport Security (HSTS) Preload
    • 5. SSM Costs and Trade-offs
      • Fortress Mentality
      • Lack of Segmentation
      • Lack of Visibility
        • Insufficient Logging
        • Lack of Network Intrusion Detection Systems (NIDS)
      • Spoofing
      • Data Exfiltration, Infiltration
        • Dropbox
        • Physical
        • Mobile Phone Data
        • DNS, SSH
      • Doppelganger Domains
      • Wrongful Trust When Loading Untrusted Web Resources
        • Content Security Policy (CSP)
        • Sub-resource Integrity (SRI)
      • TLS Downgrade
        • HTTP Strict Transport Security (HSTS)
        • HTTP Strict Transport Security (HSTS) Preload
  • 9. Cloud
    • 1. SSM Asset Identification
      • Productivity
      • Competitive Advantage
      • Control
      • Data
    • 2. SSM Identify Risks
      • Shared Responsibility Model
        • CSP Responsibility
        • CSP Customer Responsibility
      • CSP Evaluation
      • Cloud Service Provider vs In-house
        • Skills
        • EULA
        • Giving up Secrets
        • Location of Data
        • Vendor lock-in
        • Possible Single Points of Failure
      • Review Other Chapters
      • People
      • Application Security
      • Network Security
      • Violations of Least Privilege
        • Machine Instance Single User Root
        • CSP Account Single User Root
      • Storage of Secrets
        • Private Key Abuse
          • SSH
          • TLS
        • Credentials and Other Secrets
          • Entered by People (manually)
          • Entered by Software (automatically)
      • Serverless
        • Third Party Services
        • Perimeterless
        • Functions
        • DoS of Lambda Functions
      • Infrastructure and Configuration Management
      • AWS
        • Password-less sudo
    • 3. SSM Countermeasures
      • Shared Responsibility Model
        • CSP Responsibility
        • CSP Customer Responsibility
      • CSP Evaluation
      • Cloud Service Provider vs In-house
        • Skills
        • EULA
        • Giving up Secrets
        • Location of Data
        • Vendor lock-in
        • Possible Single Points of Failure
      • Review Other Chapters
      • People
      • Application Security
      • Network Security
      • Violations of Least Privilege
        • Machine Instance Single User Root
        • CSP Account Single User Root
      • Storage of Secrets
        • Private Key Abuse
          • SSH
          • TLS
        • Credentials and Other Secrets
          • Entered by People (manually)
          • Entered by Software (automatically)
      • Serverless
        • Third Party Services
        • Perimeterless
        • Functions
        • DoS of Lambda Functions
        • Centralised logging of AWS Lambda Functions
        • Frameworks
      • Infrastructure and Configuration Management
      • AWS
        • Password-less sudo
        • Additional Tooling
    • 4. SSM Risks that Solution Causes
      • Shared Responsibility Model
      • CSP Evaluation
      • Cloud Service Provider vs In-house
      • People
      • Application Security
      • Network Security
      • Violations of Least Privilege
      • Storage of Secrets
        • Private Key Abuse
          • SSH
          • TLS
        • Credentials and Other Secrets
          • Entered by People (manually)
          • Entered by Software (automatically)
      • Serverless
        • Functions
        • DoS of Lambda Functions
        • Frameworks
      • Infrastructure and Configuration Management
      • AWS
        • Additional Tooling
    • 5. SSM Costs and Trade-offs
      • Shared Responsibility Model
      • CSP Evaluation
      • Cloud Service Provider vs In-house
      • People
      • Application Security
      • Network Security
      • Violations of Least Privilege
      • Storage of Secrets
        • Private Key Abuse
          • SSH
          • TLS
        • Credentials and Other Secrets
          • Entered by People (manually)
          • Entered by Software (automatically)
      • Serverless
        • Functions
        • DoS of Lambda Functions
        • Frameworks
      • Infrastructure and Configuration Management
      • AWS
        • Additional Tooling
  • 10. Web Applications
    • 1. SSM Asset Identification
    • 2. SSM Identify Risks
      • Lack of Visibility
        • Insufficient Logging and Monitoring
      • Lack of Input Validation, Filtering and Sanitisation
        • Generic
          • What is Validation
          • What is Filtering
          • What is Sanitisation
        • Cross-Site Scripting (XSS)
      • Cross-Site Request Forgery (CSRF)
      • Injection
        • SQLi
        • NoSQLi
        • Command Injection
        • XML Injection
        • XSLT Injection
        • XPath Injection
        • XQuery Injection
        • LDAP Injection
      • Captcha
      • Management of Application Secrets
        • Datastore Compromise
        • Cracking
      • Lack of Authentication, Authorisation and Session Management
        • What is Authentication
        • What is Authorisation
      • Cryptography on the Client (AKA Untrusted Crypto)
      • Consuming Free and Open Source
      • Insufficient Attack Protection
        • Lack of Active Automated Prevention
    • 3. SSM Countermeasures
      • Lack of Visibility
        • Insufficient Logging
          • Opening a UDP port
          • Using Posix
        • Insufficient Monitoring
          • Dark Cockpit
          • Statistics Graphing
      • Lack of Input Validation, Filtering and Sanitisation
        • Generic
          • Types of Escaping:
          • Example in JavaScript and C#
          • Example in JavaScript and NodeJS
          • Other things to think about
        • Cross-Site Scripting (XSS)
      • Cross-Site Request Forgery (CSRF)
      • Injection
        • SQLi
        • NoSQLi
        • Command Injection
        • XML Injection
        • XSLT Injection
        • XPath Injection
        • XQuery Injection
        • LDAP Injection
      • Captcha
        • Types
        • Offerings
        • Alternative Approaches
        • Still Not Cutting it
        • User Time Expenditure
        • Bot Pot
        • Testing
      • Management of Application Secrets
        • Store Configuration in Configuration files
          • node-config
          • Windows
          • Linux
        • Least Privilege
        • Location
        • Datastore Compromise
          • Which KDF to use?
        • Caching of Sensitive Data
        • Cracking
      • Lack of Authentication, Authorisation and Session Management
        • Chosen technologies:
        • Technology and Design Decisions
          • Reference Token vs JSON Web Token (JWT)
          • IdentityServer3
          • MembershipReboot
          • External Identity Providers
        • Architecture
        • Securing Sessions
      • Cryptography on the Client (AKA Untrusted Crypto)
        • Web Cryptography API
        • user agent
        • [[handle]]
        • CryptoKey (Web API interface)
        • The other two Web Crypto API interfaces
          • Crypto (Web API interface)
          • SubtleCrypto (Web API interface)
        • Cloud Storage
        • Protected Data and Document Exchange
      • Consuming Free and Open Source
        • Process
        • Consumption is Your Responsibility
        • Keeping Safe
          • wget, curl, etc
          • npm install
          • Doppelganger Packages
          • Whitelisting Packages via npm Enterprise
        • Tooling
          • npm-outdated
          • npm-check
          • David
          • RetireJS
          • requireSafe
          • bithound
          • Node Security Platform (NSP)
          • Snyk
          • Github
      • Insufficient Attack Protection
        • Web Application Firewall (WAF)
        • Application Intrusion Detection and Response
        • Active Automated Prevention
    • 4. SSM Risks that Solution Causes
      • Lack of Visibility
        • Insufficient Logging and Monitoring
      • Lack of Input Validation, Filtering and Sanitisation
        • Cross-Site Scripting (XSS)
      • Cross-Site Request Forgery (CSRF)
      • Injection
        • SQLi
        • NoSQLi
        • Command Injection
        • XML Injection
        • XSLT Injection
        • XPath Injection
        • XQuery Injection
        • LDAP Injection
      • Captcha
      • Management of Application Secrets
        • Store Configuration in Configuration files
          • node-config
          • Windows:
          • Linux:
        • Least Privilege
        • Location
        • Datastore Compromise
      • Lack of Authentication, Authorisation and Session Management
      • Cryptography on the Client (AKA Untrusted Crypto)
      • Consuming Free and Open Source
        • Process
        • Tooling
      • Insufficient Attack Protection
    • 5. SSM Costs and Trade-offs
      • Lack of Visibility
        • Insufficient Logging and Monitoring
      • Lack of Input Validation, Filtering and Sanitisation
        • Cross-Site Scripting (XSS)
      • Cross-Site Request Forgery (CSRF)
      • Injection
        • SQLi
        • NoSQLi
        • Command Injection
        • XML Injection
        • XSLT Injection
        • XPath Injection
        • XQuery Injection
        • LDAP Injection
      • Captcha
      • Management of Application Secrets
        • Store Configuration in Configuration files
          • Windows:
          • Linux
        • Least Privilege
        • Location
        • Datastore Compromise
      • Lack of Authentication, Authorisation and Session Management
      • Cryptography on the Client (AKA Untrusted Crypto)
      • Consuming Free and Open Source
      • Insufficient Attack Protection
  • Additional Resources
    • VPS
    • Network
    • Cloud
    • Web Applications
  • Attributions
    • Introduction
    • VPS
    • Network
    • Cloud
    • Web Applications

The Leanpub 45-day 100% Happiness Guarantee

Within 45 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

See full terms...

Write and Publish on Leanpub

Authors, publishers and universities use Leanpub to publish amazing in-progress and completed books and courses, just like this one. You can use Leanpub to write, publish and sell your book or course as well! Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks. Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. It really is that easy.

Learn more about writing on Leanpub