Security Basics mailing list archives
Re: Internal attacks on web application
From: "Sven Édouard" <sven_edouard () fastmail co uk>
Date: Wed, 14 Jun 2006 17:01:22 -0700
You may want to use a staged or limited/jailed environment where the settings are different so that live access is limited to very few persons after code review of changes. You can force database passwords and other important information to be different for internal staging environment and the live site, thus you don't even tell any developers the live passwords. Also, if you modularize the design, you can mirror the environment exactly, except for the details you want to keep secret. Sven On 8 Jun 2006 16:33:07 -0000, krisleech () interkonect com said:
We are moving some of our products from tradional client/server to web based applications. The problem is all languages aimed at building web apps are JIT compiled (interpreted) therefore you have to distribute source code or bytecode. Bytecode is easily reversed to code. This leaves us with a problem, the application and data are open to internal attack. Firstly code can be injected (very easily in languages like ruby), encryption keys can be read, as well as database passwords. We have looked at Java, .NET and Ruby, all have the same problem, they can not be compiled to native code. Any suggestions would be very helpful. Kris.
-- Sven Édouard sven_edouard () fastmail co uk -- http://www.fastmail.fm - One of many happy users: http://www.fastmail.fm/docs/quotes.html
Current thread:
- Internal attacks on web application krisleech (Jun 09)
- Re: Internal attacks on web application Bob Jones (Jun 12)
- Re: Internal attacks on web application André Gil (Jun 12)
- Re: Internal attacks on web application Greg Merideth (Jun 12)
- RE: Internal attacks on web application Joel Parramore (Jun 12)
- Re: Internal attacks on web application Adam Dyga (Jun 12)
- Re: Internal attacks on web application Sven Édouard (Jun 15)
