Ankita Dhakar
Ankita Dhakar

@expankita

24 Tweets 3 reads Aug 07, 2023
Hello Hackers 🥷🏾
Do you want to know how to avoid and fix some of the most common web design flaws?
I'm sharing 10 common web design flaws that you should avoid at all costs, and how to fix them based on the OWASP Top 10 web application security risks 🙅‍♀️
Read 🧵
1️⃣Broken Access Control: This flaw allows unauthorized users to access or modify resources that they should not have access to, such as other users' data or admin functions.
➡️To fix this, you should implement proper authorization checks for every request, enforce the principle of least privilege, and use secure tokens or cookies for session management 🔐
2️⃣Cryptographic Failures: This flaw occurs when cryptography is used incorrectly or not at all, leading to sensitive data exposure or system compromise
➡️To fix this, you should use strong and up-to-date encryption algorithms and libraries, store keys securely, and avoid hard-coding secrets in your code 🔑
3️⃣Injection: This flaw happens when user input is not properly validated or escaped, allowing attackers to inject malicious code or commands into your application. This can result in data loss, corruption, or disclosure, as well as remote code execution.
➡️To fix this, you should use parameterized queries or prepared statements for database access, encode or sanitize user input before outputting it, and implement input validation and output escaping for all data sources 💉
4️⃣Insecure Design: This flaw stems from design choices that do not consider security implications or trade-offs, such as using insecure protocols, default configurations, or outdated components. This can make your application vulnerable to various attacks or bypasses.
➡️To fix this, you should follow secure design principles and patterns, use threat modeling and risk analysis techniques, and adopt a security-by-design approach 🛡️
5️⃣Security Misconfiguration: This flaw results from incorrect or incomplete configuration of your application or its components, such as servers, databases, or frameworks. This can expose your application to unauthorized access, data leakage, or denial of service
➡️To fix this, you should use secure defaults and harden your configurations, disable unnecessary features or services, and apply security patches regularly ⚙️
6️⃣Vulnerable and Outdated Components: This flaw arises when your application uses components that have known vulnerabilities or are no longer supported by their vendors. This can expose your application to exploits that can compromise its functionality or security
➡️To fix this, you should keep an inventory of your components and their versions, monitor security advisories and updates, and replace or remove vulnerable components as soon as possible 🆙
7️⃣Server Side Request Forgery: This flaw occurs when your application makes requests to external resources without validating the uServer-Sideser-supplied URI.
➡️This can allow attackers to trick your application into sending requests to unintended destinations, such as internal systems or malicious servers.
➡️To fix this, you should whitelist the allowed URIs or domains for external requests, validate the user input against the whitelist, and use secure protocols and certificates for communication📡
8️⃣Unrestricted Resource Consumption: This flaw happens when your application does not limit the amount of resources it consumes to satisfy user requests, such as CPU, memory, bandwidth, or third-party services. This can lead to denial of service or increased operational costs
➡️ To fix this, you should implement rate limiting, throttling, caching, and quota mechanisms for your API endpoints and resource-intensive operations💸
9️⃣Improper Inventory Management: This flaw stems from the lack of proper documentation and inventory of your API endpoints and versions.
➡️This can make it difficult to track and manage the security of your APIs, as well as expose debug endpoints or deprecated versions to attackers
➡️To fix this, you should document your APIs using standard formats and tools, maintain an updated inventory of your hosts and deployed versions, and remove unused or outdated endpoints 📝
🔟Broken Function Level Authorization: This flaw is similar to broken access control but focuses on the authorization of specific functions within your application rather than resources
➡️This can allow attackers to perform actions that they are not allowed to do, such as changing their role or status. To fix this, you should define clear and granular access control policies for each function based on the user's role and context 🚫
Thank you for reading 🙏
If you found this thread helpful or interesting, please like ❤️ and share 🔁 it
Stay safe and Happy hacking 🥷😷

Loading suggestions...