[WEB SECURITY] "Web Application Defense At The Gates - Leveraging IHttpModule" By Shreeraj Shah

Bob Auger bauger at spidynamics.com
Mon May 9 09:35:54 EDT 2005


I found an interesting article written by Shreeraj Shah on the .NET IHttpModule interface today at http://www.net-security.org



"Web applications are vulnerable to many attacks, mainly due to poor input validation at the source code level. Firewalls can block access to ports but once a web application goes live and TCP ports 80 and 443 are accessible, the web application can be an easy prey for attackers. HTTP traffic is legitimate traffic for web applications; all the more reason to include application-level content-filtering over unencrypted and encrypted communication channels. Application-level content filtering is possible to some extent but may not work over HTTPS (port 443). The only way to provide a strong defense is by applying powerful content-filtering at the application-level for both TCP port 80 and TCP port 443.

The .Net framework with ASP.NET provides the IHttpModule interface access to HTTP pipes - the lowest of programming layers - before an incoming HTTP request hits the web application. This can provide defense at the gates. In this paper, we look at how one can build this sort of defense in all three aspects - coding, deployment and configuration" - Shreeraj Shah


http://www.net-security.org/dl/articles/WebApp_HTTPMod.pdf



Robert Auger
SPI Labs
rauger at spidynamics.com
Start Secure. Stay Secure.
Security Assurance Throughout the Application Lifecycle


---------------------------------------------------------------------
The Web Security Mailing List
http://www.webappsec.org/lists/websecurity/



More information about the websecurity mailing list