 <?xml-stylesheet type="text/css" href="https://www.rossimassimiliano.it/Data/style/rss/rss1.css" ?> <?xml-stylesheet type="text/xsl" href="https://www.rossimassimiliano.it/Data/style/rss/rss1.xsl" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
  <channel>
    <title>Blog</title>
    <link>https://www.rossimassimiliano.it/blog</link>
    <description />
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>mojoPortal Blog Module</generator>
    <language>it-IT</language>
    <managingEditor>massimiliano@rossimassimiliano.it (Massimiliano Rossi)</managingEditor>
    <ttl>2</ttl>
    <atom:link href="https://www.rossimassimiliano.it/Blog/RSS.aspx?p=14~7~1&amp;r=c069feff-4d9e-41b6-80a1-89ab3b1b3605" rel="self" type="application/rss+xml" />
    <itunes:author>massimiliano@rossimassimiliano.it (Massimiliano Rossi)</itunes:author>
    <itunes:owner>
      <itunes:email>massimiliano@rossimassimiliano.it</itunes:email>
      <itunes:name>Massimiliano Rossi</itunes:name>
    </itunes:owner>
    <itunes:explicit>no</itunes:explicit>
    <item>
      <title>Code Access Security</title>
      <description><![CDATA[<p><b>Code Access Security</b> (CAS), in the <a class="mw-redirect" href="https://en.wikipedia.org/wiki/Microsoft_.NET" title="Microsoft .NET">Microsoft .NET</a> framework, is <a href="https://en.wikipedia.org/wiki/Microsoft" title="Microsoft">Microsoft</a>'s solution to prevent untrusted code from performing privileged actions. When the <a href="https://en.wikipedia.org/wiki/Common_Language_Runtime" title="Common Language Runtime">CLR</a> loads an <a href="https://en.wikipedia.org/wiki/Assembly_(CLI)" title="Assembly (CLI)">assembly</a> it will obtain <a href="https://en.wikipedia.org/wiki/Code_Access_Security#Evidence">evidence</a> for the assembly and use this to identify the <a href="https://en.wikipedia.org/wiki/Code_Access_Security#Code_group">code group</a> that the assembly belongs to. A code group contains a permission set (one or more <a href="https://en.wikipedia.org/wiki/File_system_permissions" title="File system permissions">permissions</a>). Code that performs a privileged action will perform a code access <a href="https://en.wikipedia.org/wiki/Code_Access_Security#Demands">demand</a> which will cause the CLR to walk up the <a href="https://en.wikipedia.org/wiki/Call_stack" title="Call stack">call stack</a> and examine the permission set granted to the assembly of each <a class="mw-redirect" href="https://en.wikipedia.org/wiki/Method_(computer_science)" title="Method (computer science)">method</a> in the call stack. The code groups and permission sets are determined by the administrator of the machine who defines the <a href="https://en.wikipedia.org/wiki/Code_Access_Security#Policy">security policy</a>.</p>
<br /><a href='https://www.rossimassimiliano.it/code-access-security'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/code-access-security</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/code-access-security</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/code-access-security</guid>
      <pubDate>Sat, 25 Apr 2020 10:03:00 GMT</pubDate>
    </item>
    <item>
      <title>man in the middle attack type</title>
      <description><![CDATA[<div class="field-main-content">
<div about="" class="entity entity-paragraphs-item paragraphs-item-featured-section paragraphs-27666 view-mode-cyber_edu" id="featured_section_27666" typeof="">
<h2 class="field-featured-section-title">Types of Man-in-the-Middle Attacks</h2>

<div class="paragraphs-items paragraphs-items-field-featured-section-pgs paragraphs-items-field-featured-section-pgs-full paragraphs-items-full">
<div class="field-featured-section-pgs">
<div about="" class="entity entity-paragraphs-item paragraphs-item-wysiwyg paragraphs-27661 view-mode-full" typeof="">
<div class="content">
<div class="field-pg-wysiwyg-body">
<p><strong>Email Hijacking</strong> – attackers gain access to a user’s email account and watch transactions to and from the account. When the time is right, for instance the user is exchanging funds with another party, the attacker takes advantage of the situation by attempting to intercept the funds by spoofing one or all members of the conversation.</p>

<p>&nbsp;</p>

<p><strong>Wi-Fi Eavesdropping</strong> – a passive way to deploy MITM attacks, Wi-Fi eavesdropping involves cyber hackers setting up public Wi-Fi connections, typically with an unsuspecting name, and gain access to their victims as soon as they connect to the malicious Wi-Fi</p>

<p>&nbsp;</p>

<p><strong>Session Hijacking</strong> – session hijacking is when an attacker gains access to an online session via a stolen session key or stolen browser cookies.</p>

<p>&nbsp;</p>

<p><strong>DNS Spoofing</strong> – an attacker engages in DNS spoofing by altering a website’s address record within a DNS (domain name server) server. A victim unknowingly visits the fake site and the attacker will attempt to steal their information.</p>

<p>&nbsp;</p>

<p>I<strong>P Spoofing</strong> – similar to DNS spoofing, IP Spoofing sees an attacker attempt to divert traffic to a fraudulent website with malicious intent. Instead of spoofing the website’s address record, the attacker disguises an IP (internet protocol) address.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<br /><a href='https://www.rossimassimiliano.it/man-in-the-middle-attack-type'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/man-in-the-middle-attack-type</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/man-in-the-middle-attack-type</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/man-in-the-middle-attack-type</guid>
      <pubDate>Fri, 03 Apr 2020 17:20:00 GMT</pubDate>
    </item>
    <item>
      <title>Prevent SQL Injection</title>
      <description><![CDATA[<p>Most instances of SQL injection can be prevented by using parameterized queries (also known as prepared statements) instead of string concatenation within the query.</p>

<p>The following code is vulnerable to SQL injection because the user input is concatenated directly into the query:</p>

<p><code>String query = "SELECT * FROM products WHERE category = '"+ input + "'"; </code></p>

<p><code>Statement statement = connection.createStatement(); </code></p>

<p><code>ResultSet resultSet = statement.executeQuery(query); </code></p>

<p>This code can be easily rewritten in a way that prevents the user input from interfering with the query structure:</p>

<p><code>PreparedStatement statement = connection.prepareStatement("SELECT * FROM products WHERE category = ?"); </code></p>

<p><code>statement.setString(1, input); </code></p>

<p><code>ResultSet resultSet = statement.executeQuery(); </code></p>

<p>Parameterized queries can be used for any situation where untrusted input appears as data within the query, including the <code>WHERE</code> clause and values in an <code>INSERT</code> or <code>UPDATE</code> statement. They can't be used to handle untrusted input in other parts of the query, such as table or column names, or the <code>ORDER BY</code> clause. Application functionality that places untrusted data into those parts of the query will need to take a different approach, such as white-listing permitted input values, or using different logic to deliver the required behavior.</p>

<p>For a parameterized query to be effective in preventing SQL injection, the string that is used in the query must always be a hard-coded constant, and must never contain any variable data from any origin. Do not be tempted to decide case-by-case whether an item of data is trusted, and continue using string concatenation within the query for cases that are considered safe. It is all too easy to make mistakes about the possible origin of data, or for changes in other code to violate assumptions about what data is tainted.</p>
<br /><a href='https://www.rossimassimiliano.it/prevent-sql-injection'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/prevent-sql-injection</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/prevent-sql-injection</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/prevent-sql-injection</guid>
      <pubDate>Fri, 03 Apr 2020 17:03:00 GMT</pubDate>
    </item>
    <item>
      <title>retrieving data with SQL Injection</title>
      <description><![CDATA[<p>Consider a shopping application that displays products in different categories. When the user clicks on the Gifts category, their browser requests the URL:</p>

<p><code>https://insecure-website.com/products?category=Gifts </code></p>

<p>This causes the application to make an SQL query to retrieve details of the relevant products from the database:</p>

<p><code>SELECT * FROM products WHERE category = 'Gifts' AND released = 1 </code></p>

<p>This SQL query asks the database to return:</p>

<ul>
	<li>all details (*)</li>
	<li>from the products table</li>
	<li>where the category is Gifts</li>
	<li>and released is 1.</li>
</ul>

<p>The restriction <code>released = 1</code> is being used to hide products that are not released. For unreleased products, presumably <code>released = 0</code>.</p>

<p>The application doesn't implement any defenses against SQL injection attacks, so an attacker can construct an attack like:</p>

<p><code>https://insecure-website.com/products?category=Gifts'-- </code></p>

<p>This results in the SQL query:</p>

<p><code>SELECT * FROM products WHERE category = 'Gifts'--' AND released = 1 </code></p>

<p>The key thing here is that the double-dash sequence <code>--</code> is a comment indicator in SQL, and means that the rest of the query is interpreted as a comment. This effectively removes the remainder of the query, so it no longer includes <code>AND released = 1</code>. This means that all products are displayed, including unreleased products.</p>

<p>Going further, an attacker can cause the application to display all the products in any category, including categories that they don't know about:</p>

<p><code>https://insecure-website.com/products?category=Gifts'+OR+1=1-- </code></p>

<p>This results in the SQL query:</p>

<p><code>SELECT * FROM products WHERE category = 'Gifts' OR 1=1--' AND released = 1 </code></p>

<p>The modified query will return all items where either the category is Gifts, or 1 is equal to 1. Since <code>1=1</code> is always true, the query will return all items.</p>
<br /><a href='https://www.rossimassimiliano.it/retrieving-data-with-sql-injection'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/retrieving-data-with-sql-injection</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/retrieving-data-with-sql-injection</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/retrieving-data-with-sql-injection</guid>
      <pubDate>Fri, 03 Apr 2020 17:01:00 GMT</pubDate>
    </item>
    <item>
      <title>sql injection</title>
      <description><![CDATA[<p><em>&lt;&lt; Le dita dell’hacker scorrono veloci sulla tastiera, il form di autenticazione web non è un problema. Non conosce username e password, non gli servono: pochi secondi, tre battute sulla tastiera e il sistema è completamente nelle sue mani. “Good Morning, Administrator!”, recita la nuova schermata. Non sono così sicuro che sarà una buona giornata per l’amministratore, pensa l’intruso fra sé. &gt;&gt;</em></p>

<p>Se pensate che una cosa simile possa accadere solo al cinema, vi ricrederete: questa scena viene girata ogni giorno decine, se non centinaia di volte, a causa di una delle tecniche di hacking del web più diffuse: la <strong>SQL injection</strong>. L’introduzione romanzata non esagera riguardo alla semplicità con cui un aggressore può oltrepassare i login messi a protezione delle nostre applicazioni web: è davvero questione di secondi.</p>
<br /><a href='https://www.rossimassimiliano.it/sql-injection'>Admin</a>]]></description>
      <link>https://www.rossimassimiliano.it/sql-injection</link>
      <author>info@rossimassimiliano.it (Admin)</author>
      <comments>https://www.rossimassimiliano.it/sql-injection</comments>
      <guid isPermaLink="true">https://www.rossimassimiliano.it/sql-injection</guid>
      <pubDate>Sun, 20 Mar 2016 18:59:00 GMT</pubDate>
    </item>
  </channel>
</rss>