Securing Node JS Apps
This book is 100% complete
Completed on 2016-12-18
About the Book
Do you ever wonder how vulnerable you are to being hacked? Do you feel confident about storing your users sensitive information? Imagine feeling confident in the integrity of your software when you store your user's sensitive data. No more fighting fires with lost data, no more late nights, your application is secure. In this short book I'll give you clear, actionable details on how to secure various parts of your web application. You will also find scenarios to handle and improve existing legacy issues.
Several years ago I was writing a web application for a client in the CodeIgniter PHP framework, *shudder*, but CodeIgniter didn't include any type of authentication system built in. I of course did what any good/lazy developer would do and went on the hunt for a well made library to supply authentication capabilities. To my chagrin I discovered that there weren't any clean, concise libraries that fit my needs for authentication in CodeIgniter. Thus began my journey of creating Ion Auth, a simple authentication library for CodeIgniter, and a career long crusade for securing web applications as well as helping other developers do the same.
Here we are years later, a lot of us have moved on to other frameworks or languages, but I still repeatedly see basic security being overlooked. So let's fix that. I want to make sure that you'll never have to live the horror of leaking user passwords, or have someone inject malicious SQL into your database, or the suite of other "hacks" that could have been easily avoided. Let's make sure we all get home on time and sleep well at night.
This is a quick read, at just over 100 pages. This is a handbook style guide to specific items you can act on. The following sections will be covered:
- Never trust your users - escape all input
- HTTPS/SSL/BCA/JWH/SHA and other random letters, some of them actually matter
- Password Encryption and Storage for Everyone
- Authentication, Access Control, and Safe File Handing
- Safe Defaults, Cross Site Scripting and other Popular Hacks
All code examples are written in JS with accompanying source code on GitHub.
This book is around 100% complete.
- Thanks to Previous Awesome Readers
- Sample Code
- About the Author
Chapter 1 - Never Trust Your Users. Sanitize ALL Input!
- SQL Injection
- Mass Assignment
- Sanitizing Output
Chapter Two - HTTPS/SSL/BCA/JWH/SHA and Other Random Letters; Some of Them Actually Matter.
- What is HTTPS
- When to use HTTPS
- Implementing HTTPS
Chapter 3 - Password Encryption and Storage for Everyone
- The Small Print
- What is a Hash?
- Popular Attacks
- A Pinch of Salt
- Hashing Algorithms
- Putting It All Together
- Brute Force Protection
- Upgrading Legacy Systems
Chapter 4 - Authentication, Access Control, and Safe File Handing
- Access Control
- Validating Redirects
- Safe File Handing
Chapter 5 - Safe Defaults, Cross Site Scripting, and Other Popular Hacks
- Never Trust Yourself - Use Safe Defaults
- Don’t Trust Dynamic Typing
- Cross Site Scripting
- Attack Entry Points
- Cross Site Request Forgery
- Multiple Form Submits
- Race Conditions
- Outdated Libraries / External Programs
- About the Author
- Security Audit / Consulting
The Leanpub 45-day 100% Happiness Guarantee
Within 45 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
See full terms...