🏠
dev-angelist
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 🏠Home
  • 📒Certification Notes
    • Certified Ethical Hacker (CEH) Practical
    • CRTP
    • eWPTXv3
    • eCPPTv3
    • eWPTv2
    • eJPTv2
  • ✍️WRITEUPS & WALKTHROUGHS
    • TryHackMe (THM)
    • HackTheBox (HTB)
    • VulnHub
    • DockerLabs.es
    • PortSwigger - Web Sec Academy
    • HomeMade Labs
  • 🕸️WEB
    • eWPTXv3
    • eWPTv2
    • WAPT
    • DVWA
    • Secure Bank
    • Mutillidae II
    • WebSafeHub (WSH)
    • PortSwigger - Web Sec Academy
  • Common Services Pentest
    • Web Services - 80/443/8080
      • Tomcat
        • Lab Setup & Configuration
        • Enumeration
        • Exploitation
        • Mitigation & Hardening
    • SMB - 139/445
  • 👩‍💻CODING
    • 🐍Python
      • Python Offensive
      • Email Header Analyzer
      • Dir-Brute
      • Port-Scanner
      • Finger User Enumeration
    • DevSecOps
    • 🔹Powershell
  • 🔴Offensive Security
    • Active Directory (AD)
      • CRTP
      • AD HomeMade Lab
  • Privilege Escalation
    • Windows Privilege Escalation
  • 🔐Crypto & AI/ML
    • Crypto & Blockchain
      • Blockchain Security
        • Blockchain Architecture
          • 1.1 Characteristics and Features
          • 1.2 Core Components
          • 1.3 Consensus Algorithm
          • 1.4 Cryptography
          • 1.5 Cryptocurrency
        • Front-end Risks
          • 2.1 MFA and Blockchain
          • 2.2 Front-end
          • 2.3 OWASP Modeling for Blockchain
          • 2.4 Wallet Attacks
          • 2.5 Client Vulnerabilities
        • Back-end Risks
          • 3.1 Consensus Vulnerabilities
          • 3.2 Mining Pool Vulnerabilities
          • 3.3 Network Vulnerabilities
            • 3.3.1 DoS/DDoS/BDoS Attacks
            • 3.3.2 Delay Attacks
            • 3.3.3 Partition Attacks
            • 3.3.4 Sybil Attacks
            • 3.3.5 Time Jacking
            • 3.3.6 Transaction Attacks
        • Mining-Risks
          • 4.1 Mining Overview
          • 4.2 Proof of Stake Post Merge Ethereum
          • 4.3 Crypto Mining Malware (Cryptojacking)
          • 4.4 Zero Trust Models
          • 4.5 Byzantine Fault Tolerance
        • Blockchain as a Service
    • AI/ML Pentest
  • ACTIVE DIRECTORY
    • AD Enumeration
  • Guides & Articles
    • My Articles
    • Guides & Tutorials
      • Burp Suite - Configuration
      • Quickemu - VM
      • Setting Up SSH Keys
      • Building an AD Lab
      • Work Guidelines
  • Windows
    • Windows Enumeration
    • Windows Privilege Escalation
  • INTELLIGENCE GATHERING
    • OSINT
  • LINUX (tbd)
    • Linux Enumeration
    • Linux Privilege Escalation
Powered by GitBook
On this page
  • OWASP (Open Web Application Security Project)
  • OWASP Top 10
  1. Crypto & AI/ML
  2. Crypto & Blockchain
  3. Blockchain Security
  4. Front-end Risks

2.3 OWASP Modeling for Blockchain

OWASP (Open Web Application Security Project)

OWASP is a non-profit organization focused on improving the security of software and web applications. It provides free, open-source resources, tools, and guidance to help developers and organizations identify and mitigate security risks. OWASP is widely respected in the cybersecurity community and is particularly known for its role in raising awareness of web application security.

Key Contributions of OWASP:

  • Guidelines & Best Practices: OWASP offers various security guides and frameworks that assist in building secure software.

  • Tools: Tools like OWASP ZAP (Zed Attack Proxy) and OWASP Dependency-Check are used for finding vulnerabilities in applications.

  • Training & Events: OWASP organizes conferences, workshops, and community activities to educate developers and security professionals about cybersecurity.

  • Documentation: OWASP maintains resources like the OWASP Cheat Sheet Series, a collection of best practices for developers.


OWASP Top 10

The OWASP Top 10 is a list of the most critical web application security risks, compiled and regularly updated by OWASP based on the real-world data collected from various security professionals and organizations. It serves as a comprehensive guide for developers, organizations, and security teams to understand the most common vulnerabilities and how to address them.

OWASP Top 10 - 2021:

  1. Broken Access Control

    • Access control issues allow unauthorized users to access restricted resources or perform actions they shouldn’t be able to. This is one of the most common security vulnerabilities.

    • Examples: Privilege escalation, unauthorized file access, bypassing authentication.

  2. Cryptographic Failures

    • This category covers problems with encryption or improper handling of sensitive data, leading to exposure.

    • Examples: Weak or outdated cryptographic algorithms, improper key management, failure to encrypt sensitive data like passwords.

  3. Injection

    • Includes SQL injection, command injection, and other types of injection attacks that exploit input fields to inject malicious code.

    • Examples: SQL injection, XML injection, LDAP injection.

  4. Insecure Design

    • Insecure design refers to vulnerabilities in the design phase of a web application. This can result from poor architectural decisions or failure to incorporate security into the design.

    • Examples: Lack of proper security controls, flawed system architecture.

  5. Security Misconfiguration

    • Security misconfigurations happen when software or systems are not securely configured, leaving them open to attacks.

    • Examples: Default credentials, unnecessary services enabled, overly permissive permissions.

  6. Vulnerable and Outdated Components

    • This refers to using outdated software libraries, frameworks, or components that have known security vulnerabilities.

    • Examples: Using old versions of libraries, failure to patch vulnerabilities in third-party components.

  7. Identification and Authentication Failures

    • Weak authentication mechanisms or improper implementation of user authentication can lead to account takeover or unauthorized access.

    • Examples: Insufficient password policies, weak multi-factor authentication (MFA), broken session management.

  8. Software and Data Integrity Failures

    • This category concerns the failure to protect data integrity, preventing unauthorized modification of code or data.

    • Examples: Code injection attacks, untrusted software updates, using weak hashing algorithms.

  9. Security Logging and Monitoring Failures

    • Failure to log and monitor security events leaves organizations vulnerable to undetected attacks or data breaches.

    • Examples: Lack of proper logging, missing alerts for suspicious activities.

  10. Server-Side Request Forgery (SSRF)

    • SSRF attacks occur when an attacker is able to send arbitrary requests from the server-side application to internal or external systems, bypassing firewall rules or access controls.

    • Examples: An attacker can manipulate a vulnerable URL request to access internal resources like metadata endpoints or private servers.

Previous2.2 Front-endNext2.4 Wallet Attacks

Last updated 6 months ago

🔐
Web-Application-Penetration-Tester-WAPT-Notes/readme/powershell-for-pt-1 at main · dev-angelist/Web-Application-Penetration-Tester-WAPT-NotesGitHub
Logo