What’s New in ASP.NET Core 10 – Key Features & Expert Insights
Microsoft has rolled out .NET Core 10.0 and brought some exciting updates that make custom software development more secure and efficient. The main focus of this update was on making...
Listening is fun too.
Straighten your back and cherish with coffee - PLAY !
Today’s web application is much more complex than they were in the past. These applications developed by web development companies have numerous layers due to which it increases the surface for any potential attack. During the development, deployment, ongoing use, and maintenance process of the web application, it is very important that proper security safeguards are kept by software development companies to reduce any potential ends for exploitation. We need to ensure that the security settings are configured and are checked frequently to protect an organization’s assets.
As security misconfiguration is a broad category it is one of the common vulnerabilities found in web applications and are hence very easily manipulated too. Web applications are built on multiple layers and hence making mistakes in the configuration in one of the layers is quite common.
The vulnerability can be compromised in the following ways:
First you need to start looking over the system.
Affected items: Server
Severity: High
The impact to the application varies and it depends on the nature of the misconfiguration.
It is the fifth most critical web application security risk according to OWASO Top ten lists.
Security misconfiguration is nothing but incorrectly assembling the safeguards of the web application. Such risks occur when holes are left open in the framework by the developers, DBAs or the administrator. This can occur at any level such as web server, application server, platform, database, custom code or frameworks etc. Such misconfigurations can guide the hacker into the system and this could result in partial or total compromised system.
Attackers can easily find these vulnerabilities through default accounts, un-patched flaws, unprotected files, directories, unused web pages and many more.
Security misconfiguration is very easily exploitable but there are number of ways to prevent them. The developers should work with the administrators to make sure that the stack is properly configured.
Following are some of the recommendations for the industry experts:
Using the Burp suite to Test Security Misconfiguration Issues
Firstly ensure that burp suite is configured to your browser
Keep intercept off in the Proxy tab
Now open the page of the web application you want to test.
Now go to burp and select the ‘target’ tab and click on ‘site map’
Locate your application’s name there and choose one of the directories randomly whic the user can access in the application. Here eg. Add attachment.
Click on the link and press spider the branch.
Select one of the directories from the ‘site map’ and explore further.
Return to the browser and add the name of the directory to the URL eg.: https://...../addattachment/
Explore all the links, files and directories you are able to find.
Here you will see that the details of the server and other unnecessary information are displayed in the error message which could be a hole for the attacker to attack the system further.
Microsoft has rolled out .NET Core 10.0 and brought some exciting updates that make custom software development more secure and efficient. The main focus of this update was on making...
Automation isn’t just a trend anymore. It’s a must-have for any business relying on the Cloud. As the firm grows, cloud infrastructure gets more complex. So, choosing the right Infrastructure...
Did you know 89% of employees feel happier and more engaged when AI and automation handle repetitive tasks? MS 365 Copilot makes this possible. Microsoft Dynamics 365 AI addresses...