<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Web Security on System Overlord</title><link>https://systemoverlord.com/tags/web-security.html</link><description>Recent content in Web Security on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Fri, 10 Jul 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/web-security/index.xml" rel="self" type="application/rss+xml"/><item><title>Comparing 3 Great Web Security Books</title><link>https://systemoverlord.com/2020/07/10/comparing-3-great-web-security-books.html</link><pubDate>Fri, 10 Jul 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/07/10/comparing-3-great-web-security-books.html</guid><description>&lt;p&gt;I thought about using a clickbait title like &amp;ldquo;Is this the best web security
book?&amp;rdquo;, but I just couldn&amp;rsquo;t do that to you all. Instead, I want to compare and
contrast 3 books, all of which I consider great books about web security. I
won&amp;rsquo;t declare any single book &amp;ldquo;the best&amp;rdquo; because that&amp;rsquo;s too subjective. Best
depends on where you&amp;rsquo;re coming from and what you&amp;rsquo;re trying to achieve.&lt;/p&gt;
&lt;p&gt;The 3 books I&amp;rsquo;m taking a look at are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://amzn.to/2ZUg4bK"&gt;Real-World Bug Hunting: A Field Guide to Web
Hacking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://amzn.to/2ZVZojX"&gt;The Web Application Hacker&amp;rsquo;s Handbook: Finding and Exploiting Security
Flaws&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://amzn.to/2W5KQ05"&gt;The Tangled Web: A Guide to Securing Modern Web
Applications&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Posting JSON with an HTML Form</title><link>https://systemoverlord.com/2016/08/24/posting-json-with-an-html-form.html</link><pubDate>Wed, 24 Aug 2016 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2016/08/24/posting-json-with-an-html-form.html</guid><description>&lt;p&gt;A coworker and I were looking at an application today that, like so many other
modern web applications, offers a RESTful API with JSON being used for
serialization of requests/responses. She noted that the application didn&amp;rsquo;t
include any sort of CSRF token and didn&amp;rsquo;t seem to use any of the headers
(X-Requested-With, Referer, Origin, etc.) as a &amp;ldquo;poor man&amp;rsquo;s CSRF token&amp;rdquo;, but
since it was posting JSON, was it really vulnerable to CSRF? &lt;strong&gt;Yes, yes,
definitely yes!&lt;/strong&gt;&lt;/p&gt;</description></item></channel></rss>