Securing Node JS Apps
This book is 100% complete
Completed on 2016-12-18
About the Book
Do you ever wonder how vulnerable you are to being hacked? Do you feel confident about storing your users sensitive information? Imagine feeling confident in the integrity of your software when you store your user's sensitive data. No more fighting fires with lost data, no more late nights, your application is secure. In this short book I'll give you clear, actionable details on how to secure various parts of your web application. You will also find scenarios to handle and improve existing legacy issues.
Several years ago I was writing a web application for a client in the CodeIgniter PHP framework, *shudder*, but CodeIgniter didn't include any type of authentication system built in. I of course did what any good/lazy developer would do and went on the hunt for a well made library to supply authentication capabilities. To my chagrin I discovered that there weren't any clean, concise libraries that fit my needs for authentication in CodeIgniter. Thus began my journey of creating Ion Auth, a simple authentication library for CodeIgniter, and a career long crusade for securing web applications as well as helping other developers do the same.
Here we are years later, a lot of us have moved on to other frameworks or languages, but I still repeatedly see basic security being overlooked. So let's fix that. I want to make sure that you'll never have to live the horror of leaking user passwords, or have someone inject malicious SQL into your database, or the suite of other "hacks" that could have been easily avoided. Let's make sure we all get home on time and sleep well at night.
This is a quick read, at just over 100 pages. This is a handbook style guide to specific items you can act on. The following sections will be covered:
- Never trust your users - escape all input
- HTTPS/SSL/BCA/JWH/SHA and other random letters, some of them actually matter
- Password Encryption and Storage for Everyone
- Authentication, Access Control, and Safe File Handing
- Safe Defaults, Cross Site Scripting and other Popular Hacks
All code examples are written in JS with accompanying source code on GitHub.
This book is around 100% complete.
- Thanks to Previous Awesome Readers
- Sample Code
- About the Author
Chapter 1 - Never Trust Your Users. Sanitize ALL Input!
- SQL Injection
- Mass Assignment
- Sanitizing Output
Chapter Two - HTTPS/SSL/BCA/JWH/SHA and Other Random Letters; Some of Them Actually Matter.
- What is HTTPS
- When to use HTTPS
- Implementing HTTPS
Chapter 3 - Password Encryption and Storage for Everyone
- The Small Print
- What is a Hash?
- Popular Attacks
- A Pinch of Salt
- Hashing Algorithms
- Putting It All Together
- Brute Force Protection
- Upgrading Legacy Systems
Chapter 4 - Authentication, Access Control, and Safe File Handing
- Access Control
- Validating Redirects
- Safe File Handing
Chapter 5 - Safe Defaults, Cross Site Scripting, and Other Popular Hacks
- Never Trust Yourself - Use Safe Defaults
- Don’t Trust Dynamic Typing
- Cross Site Scripting
- Attack Entry Points
- Cross Site Request Forgery
- Multiple Form Submits
- Race Conditions
- Outdated Libraries / External Programs
- About the Author
- Security Audit / Consulting
The Leanpub 45-day 100% Happiness Guarantee
Within 45 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
See full terms
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers), EPUB (for phones and tablets) and MOBI (for Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.