Andaira Technology

Mejoramos los procesos, reducimos los costes

Curso: .NET, C# and ASP.NET Security Development  


Certificación: N/A 

Accreditación: None 

Duración: 2 días 

Idioma del material: Inglés 

Formato: Presencial 

Creditos: N/A

Introducción:

A number of programming languages are available today to compile code to .NET and ASP.NET frameworks. The environment provides powerful means for security development, but developers should know how to apply the architecture- and coding-level programming techniques in order to implement the desired security functionality and avoid vulnerabilities or limit their exploitation.

The aim of this course is to teach developers through numerous hands-on exercises how to prevent untrusted code from performing privileged actions, protect resources through strong authentication and authorization, provide remote procedure calls, handle sessions, introduce different implementations for certain functionality, and many more.

Introduction of different vulnerabilities starts with presenting some typical programming problems committed when using .NET, while the discussion of vulnerabilities of the ASP.NET also deals with various environment settings and their effects. Finally, the topic of ASP.NET-specific vulnerabilities not only deals with some general Web application security challenges, but also with special issues and attack methods like attacking the ViewState, or the string termination attacks.

Audiencia:

.NET, C# and ASP.NET developers, software architects and testers

Objetivos:

Individuals certified at this level will have demonstrated:

  • Understand basic concepts of security, IT security and secure coding
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Learn to use various security features of the .NET development environment
  • Get information about some recent vulnerabilities in .NET and ASP.NET
  • Learn about typical coding mistakes and how to avoid them
  • Get sources and further reading on secure coding practices

Prerrequisitos:

None

Material del curso:

You will receive the following as part of this course:

  • A participant handbook with reference materials
  • Virtual machine with the exercises (to be distributed by the instructor on a USB drive)

Examen:

There are no exams associated with this course

Requisitos técnicos:

A preinstalled exercise environment in the form of desktop virtual machine will be distributed on USB sticks for the participants at the start of the course by the instructor.

Hardware and software specifications for the used host PCs are:

  • CPU equivalent to Core i5 with virtualization technology is recommended, minimum is Core i3 (or equivalent laptop processors)
  • 4GB is recommended, minimum is 2GB
  • At least 20 GB free space on the HDD.
  • Display resolution minimum 1024×768 (the larger the better)
  • Keyboard, mouse: any can be used as long as participants are familiar with them.
  • VMware Player minimal version is 3.2, preferred is 5.0.4.

Temario:

IT security and secure coding

  • Nature of security
  • IT security related terms
  • Definition of risk
  • Different aspects of IT security
  • Requirements of different application areas
  • IT security vs. secure coding
  • From vulnerabilities to botnets and cybercrime
  • Classification of security flaws

Web application vulnerabilities

  • Injection
  • Broken authentication and session management
  • Cross-Site Scripting (XSS)
  • Insecure direct object reference
  • Missing function level access control
  • Cross Site Request Forgery (CSRF)
  • Unvalidated redirects and forwards

.NET security architecture and services

  • .NET architecture
  • Code Access Security
  • Role-based security
  • Cryptography in .NET

ASP.NET security architecture

  • ASP.NET basics
  • ASP.NET features
  • ASP.NET authentication and identity management
  • ASP.NET authorization

Using security testing tools

  • Web vulnerability scanners
  • SQL injection tools
  • Static code analysis

Typical coding errors in .NET

  • Input validation
  • Improper use of security features
  • Improper error and exception handling
  • Time and state problems
  • Code quality problems

ASP.NET security features and  vulnerabilities

  • Custom protected configuration providers
  • Postback validation
  • Viewstate protection
  • Viewstate protection
  • Event validation
  • Accessing disabled and hidden controls
  • Control sequence attacks
  • NULL byte termination vulnerability
  • Real life example – Forms Authentication Bypass
  • Denial of service possibilities

Knowledge sources

  • Secure coding sources – a starter kit
  • Vulnerability databases