Hack Proofing ColdFusion
Home > Computing and Information Technology > Computer security > Computer fraud and hacking > Hack Proofing ColdFusion
Hack Proofing ColdFusion

Hack Proofing ColdFusion


     0     
5
4
3
2
1



Available


About the Book

The only way to stop a hacker is to think like one! ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance. Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications.

Table of Contents:
Foreword Chapter 1 Thinking Like a Hacker Introduction Understanding the Terms A Brief History of Hacking Why Should I Think Like a Hacker? Mitigating Attack Risk in Your ColdFusion Applications Validating Page Input Functionality with Custom Tags and CFMODULE The Top ColdFusion Application Hacks Form Field Manipulation URL Parameter Tampering CFFILE, CFPOP, and CFFTP Tag Misuse ColdFusion RDS Compromise Understanding Hacker Attacks Denial of Service Virus Hacking Preventing “Break-ins” by Thinking Like a Hacker Development Team Guidelines QA Team Guidelines IT Team Guidelines Summary Solutions Fast Track Frequently Asked Questions Chapter 2 Securing Your ColdFusion Development Introduction Session Tracking CFID and CFTOKEN Issues Error Handling Verifying Data Types Summary Solutions Fast Track Frequently Asked Questions Chapter 3 Securing Your ColdFusion Tags Introduction Identifying the Most Dangerous ColdFusion Tags Properly (and Improperly) Using Dangerous Tags Using the Tag Using the Tag Using the Tag Using the Tag Using the Tag Using the Tag Using the Tag Using the Tag Using the Tag Using the Tag Using the connectstring Attribute Using the dbtype=dynamic Attribute Knowing When and Why You Should Turn Off These Tags Controlling Threading within Dangerous Tags Working with Other Dangerous and Undocumented Tags Using the GetProfileString() and ReadProfileString() Functions Using the GetTempDirectory() Function Using the GetTempFile() Function Using the Tag Using the CF_SetDataSourceUsername(), CF_GetDataSourceUsername(), CF_SetDataSourcePassword(), CF_SetODBCINI(), and CF_GetODBCINI() Functions Using the CF_GetODBCDSN() Function Using the CFusion_Encrypt() and CFusion_Decrypt() Functions Summary Solutions Fast Track Frequently Asked Questions Chapter 4 Securing Your ColdFusion Applications Introduction Cross-Site Scripting URL Hacking Validating Browser Input Malformed Input Validating Consistently from the “Hit List” Using Using Using and Using (or Not Using) Using Web-Based File Upload Issues Techniques to Protect Your Application when Accepting File Uploads URL Session Variables Session ID Summary Solutions Fast Track Frequently Asked Questions Chapter 5 The ColdFusion Development System Introduction Understanding the ColdFusion Application Server Thread Pooling Custom Memory Management Page-based Applications JIT Compiler Database Connection Manager Scheduling Engine Indexing Engine Distributed Objects Understanding ColdFusion Studio Setting Up FTP and RDS Servers Thinking of ColdFusion as Part of a System Securing Everything to Which ColdFusion Talks Summary Solutions Fast Track Frequently Asked Questions Chapter 6 Configuring ColdFusion Server Security Introduction Setting Up the ColdFusion Server Using “Basic Security” Employing Encryption under the Basic Security Setup Authentication under the Basic Security Setup Customizing Access Control under the Basic Security Setup Accessing Server Administration under the Basic Security Setup Setting Up the ColdFusion Server Using “Advanced Security” Employing Encryption under the Advanced Security Setup Authentication under the Advanced Security Setup Customizing Access Control under the Advanced Security Setup Performance Considerations When Using Basic or Advanced Security Caching Advanced Security Information File and Data Source Access Summary Solutions Fast Track Frequently Asked Questions Chapter 7 Securing the ColdFusion Server after Installation Introduction What to Do with the Sample Applications Reducing Uncontrolled Access Choosing to Enable or Disable the RDS Server Limiting Access to the RDS Server Securing Remote Resources for ColdFusion Studio Creating a Security Context Debug Display Restrictions Using the mode=debug Parameter Microsoft Security Tool Kit MS Strategic Technology Protection Program Summary Solutions Fast Track Frequently Asked Questions Chapter 8 Securing Windows and IIS Introduction Security Overview on Windows, IIS, and Microsoft Securing Windows 2000 Server Avoiding Service Pack Problems with ColdFusion Using Windows Services (“Use Only What You Need”) Working with Users and Groups Understanding Default File System and Registry Permissions Securing the Registry Other Useful Considerations for Securing the Registry and SAM Installing Internet Information Services 5.0 Removing the Default IIS 5.0 Installation Creating an Answer File for the New IIS Installation Securing Internet Information Services 5.0 Setting Web Site, FTP Site, and Folder Permissions Restricting Access through IP Address and Domain Name Blocking Configuring Authentication Examining the IIS Security Tools Using the Hotfix Checker Tool Using the IIS Security Planning Tool Using the Windows 2000 Internet Server Security Configuration Tool for IIS 5.0 Auditing IIS Summary Solutions Fast Track Frequently Asked Questions Chapter 9 Securing Solaris, Linux, and Apache Introduction Solaris Solutions Overview of the Solaris OS Understanding Solaris Patches Securing Default Solaris Services Security Issues for Solaris 2.6 and Later Other Useful Considerations in Securing Your Solaris Installation Linux Solutions Understanding Linux Installation Considerations Selecting Packages for Your Linux Installation Hardening Linux Services Securing Your Suid Applications Understanding Sudo System Requirements Learning More About the Sudo Command Downloading Sudo Installing Sudo Configuring Sudo Running Sudo Running Sudo with No Password Logging Information with Sudo Other Useful Considerations to Securing Your Linux Installation Apache Solutions Configuring Apache on Solaris and Linux Configuring Apache Modules Choosing Apache SSL Summary Solutions Fast Track Frequently Asked Questions Chapter 10 Database Security Introduction Database Authentication and Authorization Authentication Authorization Database Security and ColdFusion Dynamic SQL Leveraging Database Security Microsoft SQL Server Microsoft Access Oracle Summary Solutions Fast Track Frequently Asked Questions Chapter 11 Securing Your ColdFusion Applications Using Third-Party Tools Introduction Firewalls Testing Firewalls DNS Tricks Port Scanning Tools Detecting Port Scanning Best Practices Install Patches Know What’s Running Default Installs Change Passwords and Keys Backup, Backup,Backup Firewalls Summary Solutions Fast Track Frequently Asked Questions Chapter 12 Security Features in ColdFusion MX Introduction Who’s Responsible for Security? A Look at Security in ColdFusion MX New and Improved Tools New Tags Summary Solutions Fast Track Frequently Asked Questions Index


Best Sellers


Product Details
  • ISBN-13: 9781928994770
  • Publisher: Syngress Media,U.S.
  • Publisher Imprint: Syngress Media,U.S.
  • Height: 234 mm
  • No of Pages: 512
  • Width: 156 mm
  • ISBN-10: 1928994776
  • Publisher Date: 25 Apr 2002
  • Binding: Paperback
  • Language: English
  • Weight: 988 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Hack Proofing ColdFusion
Syngress Media,U.S. -
Hack Proofing ColdFusion
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Hack Proofing ColdFusion

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!