Author image

Philippe_CERY

Coding Dojo équipe @pcery

Ce Mardi 4 Mars 2014 avait lieu le Coding Dojo de mon équipe. Voici un petit résumé. Déroulement de la journée L’objectif principal de cette journée était de découvrir AngularJS [http://angularjs.org/]. Autour des maîtres de cérémonies, Alvin et Alexis, j’avais avec moi douze participants hyper motivés.

OWASP Top 10 - A6 Sensitive Data Exposure

Description We have seen in the previous articles that an experienced attacker can easily intercept data in transit (e.g. on a public Wifi hotspot) or have access to data stored in your database (e.g. using SQL injection). If the stolen information is sensitive (password, credit card number, personal

OWASP Top 10 - A5 Security Misconfiguration

Description Nowadays, besides the operating system and the JRE, most of the Java applications are based on third-party frameworks, open-source or proprietary. Moreover, a web application is deployed on an application server (or a servlet container). All these components represent a lot of potential risks an attacker can use if

OWASP Top 10 - A4 Insecure Direct Object References

Description The application exposes a direct reference (functional identifier, database key, file path…) to a resource. Thanks to that direct reference, an attacker can guess other direct references and access to other resources. Usually, you will find direct references in links and selection lists (drop-down list, radio buttons and checkboxes)

OWASP Top 10 - A3 Cross Site Scripting (XSS)

Description Cross-Site Scripting is a specific consequence of an injection attack. The goal is to make a web browser execute arbitrary scripting code (Javascript, ActionScript, ActiveX…) usually to steal personal information. Examples Persistent XSS attack The attacker’s bank website proposes a messaging service to communicate with the clerk. The

OWASP Top 10 - A1 Injection

Description The attacker sends untrusted data that will be injected in the targeted application to change its behaviour. The goal of this attack is usually to steal data but it can also be used to delete or corrupt your data or result in denial of service. Example I’m connected

OWASP Top 10 - Introduction

When starting a new web application, the security risks are sadly often underestimated by everyone (developers, architects, IT, managers…). Web applications are more vulnerable to attacks compared to standalone applications as they usually expose a service over a network to a potentially large population of users. Of course, the risk

Test de Web Services : JMeter vs. soapUI

Pour tester des web services, il n’existe pas énormément de solutions open-source. Je vous en propose 2 en fonction du type de tests que vous souhaitez réaliser. Apache JMeter [http://jakarta.apache.org/jmeter/] est l’outil open-source de tests connu et reconnu. Il est généralement utilisé pour tester

Remote testing avec JMeter

Ceux qui ont déjà exécuté des tests de charge, savent que la machine cliente (celle qui simule les utilisateurs) est aussi importante que le serveur testé. Si la machine cliente est incapable de simuler correctement le nombre d’utilisateurs voulu à cause d’un processeur trop faible, d’un manque