Podchaser Logo
Home
#SecurityCulture: Injection

#SecurityCulture: Injection

Released Thursday, 23rd January 2020
Good episode? Give it some love!
#SecurityCulture: Injection

#SecurityCulture: Injection

#SecurityCulture: Injection

#SecurityCulture: Injection

Thursday, 23rd January 2020
Good episode? Give it some love!
Rate Episode

Welcome to the third episode of our Security Culture Campaign! On today’s show Matt Konda talks Injection, which is a serious class of vulnerability that can happen in any language.

Click here for the associated YouTube video.

Injection happens when user inputted data is treated as part of an OS command or part of a query - usually through string concatenation.

As developers, we need to apply appropriate controls. Strict input validation is always recommended but in addition we need to do one or more of the following to prevent injection in various parts of our apps:

  • Parameterize queries
  • Decouple user input from real file system paths
  • Use shell encoding

Injection resources include:

  1. The OWASP Top 10: #1 Injection
  2. Sqlmap
  3. Metasploit
  4. Query Parameterization Cheat Sheet
  5. Testing for Command Injection

The Jemurai Security Culture Campaign Series is a stream of topical content released every Thursday intended to help developers think about security in a particular area. The content will be available in associated videos, podcasts and blog posts.

Click here to request a topic.

Show More
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Episode Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
,

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features