@@ -45,57 +45,57 @@ mappings to existing labs or people who have agreed to work on one:
45
45
* Input Validation: A Few Simple Data Types - [ input1] ( input1.html )
46
46
* Sidequest: Text, Unicode, and Locales
47
47
* Validating Text
48
- * Introduction to Regular Expressions
48
+ * Introduction to Regular Expressions - NEED
49
49
* Using Regular Expressions for Text Input Validation - [ input2] ( input2.html )
50
- * Countering ReDoS Attacks on Regular Expressions
50
+ * Countering ReDoS Attacks on Regular Expressions - NEED
51
51
* Input Validation: Beyond Numbers and Text
52
- * Insecure Deserialization
53
- * Input Data Structures (XML, HTML, CSV, JSON, & File Uploads)
54
- * Minimizing Attack Surface, Identification, Authentication, and Authorization
55
- * Search Paths and Environment Variables (including setuid/setgid Programs)
56
- * Special Inputs: Secure Defaults and Secure Startup
52
+ * Insecure Deserialization - NEED
53
+ * Input Data Structures (XML, HTML, CSV, JSON, & File Uploads) - NEED
54
+ * Minimizing Attack Surface, Identification, Authentication, and Authorization - NEED
55
+ * Search Paths and Environment Variables (including setuid/setgid Programs) - NEED
56
+ * Special Inputs: Secure Defaults and Secure Startup - NEED
57
57
* Consider Availability on All Inputs
58
- * Consider Availability on All Inputs Introduction
58
+ * Consider Availability on All Inputs Introduction - NEED
59
59
* Processing Data Securely
60
60
* Processing Data Securely: General Issues
61
- * Prefer Trusted Data. Treat Untrusted Data as Dangerous
62
- * Avoid Default & Hardcoded Credentials
63
- * Avoid Incorrect Conversion or Cast
61
+ * Prefer Trusted Data. Treat Untrusted Data as Dangerous - NEED
62
+ * Avoid Default & Hardcoded Credentials - NEED
63
+ * Avoid Incorrect Conversion or Cast - NEED
64
64
* Processing Data Securely: Undefined Behavior / Memory Safety
65
- * Countering Out-of-Bounds Reads and Writes (Buffer Overflow)
66
- * Double-free, Use-after-free, and Missing Release
67
- * Avoid Undefined Behavior
65
+ * Countering Out-of-Bounds Reads and Writes (Buffer Overflow) - NEED
66
+ * Double-free, Use-after-free, and Missing Release - NEED
67
+ * Avoid Undefined Behavior - NEED
68
68
* Processing Data Securely: Calculate Correctly
69
- * Avoid Integer Overflow, Wraparound, and Underflow
69
+ * Avoid Integer Overflow, Wraparound, and Underflow - NEED
70
70
* Calling Other Programs
71
71
* Introduction to Securely Calling Programs
72
72
* Introduction to Securely Calling Programs - The Basics
73
73
* Calling Other Programs: Injection and Filenames
74
- * SQL Injection
75
- * OS Command (Shell) injection
76
- * Other Injection Attacks
77
- * Filenames (Including Path Traversal and Link Following)
74
+ * SQL Injection - NEED
75
+ * OS Command (Shell) injection - NEED
76
+ * Other Injection Attacks - NEED
77
+ * Filenames (Including Path Traversal and Link Following) - NEED
78
78
* Calling Other Programs: Other Issues
79
- * Call APIs for Programs and Check What Is Returned
80
- * Handling Errors
81
- * Logging
82
- * Debug and Assertion Code
83
- * Countering Denial-of-Service (DoS) Attacks
79
+ * Call APIs for Programs and Check What Is Returned - NEED
80
+ * Handling Errors - NEED
81
+ * Logging - NEED
82
+ * Debug and Assertion Code - NEED
83
+ * Countering Denial-of-Service (DoS) Attacks - NEED
84
84
* Sending Output
85
- * Introduction to Sending Output
86
- * Countering Cross-Site Scripting (XSS)
85
+ * Introduction to Sending Output - NEED
86
+ * Countering Cross-Site Scripting (XSS) - NEED
87
87
* Content Security Policy (CSP) - [ csp1] ( csp1.html )
88
- * Other HTTP Hardening Headers
89
- * Cookies & Login Sessions
90
- * CSRF / XSRF
91
- * Open Redirects and Forwards
92
- * HTML ** target** and JavaScript ** window.open()**
93
- * Using Inadequately Checked URLs / Server-Side Request Forgery (SSRF)
94
- * Same-Origin Policy and Cross-Origin Resource Sharing (CORS)
95
- * Format Strings and Templates
96
- * Minimize Feedback / Information Exposure
97
- * Avoid caching sensitive information
98
- * Side-Channel Attacks
88
+ * Other HTTP Hardening Headers - (probably continue csp1) NEED
89
+ * Cookies & Login Sessions - NEED
90
+ * CSRF / XSRF - NEED
91
+ * Open Redirects and Forwards - NEED
92
+ * HTML ** target** and JavaScript ** window.open()** - NEED
93
+ * Using Inadequately Checked URLs / Server-Side Request Forgery (SSRF) - NEED
94
+ * Same-Origin Policy and Cross-Origin Resource Sharing (CORS) - NEED
95
+ * Format Strings and Templates - NEED
96
+ * Minimize Feedback / Information Exposure - NEED
97
+ * Avoid caching sensitive information - NEED
98
+ * Side-Channel Attacks - NEED
99
99
100
100
## Other information
101
101
0 commit comments