In this weeks episode we continue our discussion with Scott Arciszewski about all things Security and Cryptography.
We start off the show by highlighting what a SQL injection attack is and the differences between (emulated) prepared statements.
This leads us on to look into how to securely handle file uploads, what a reverse shell is and how to defend yourself against XSS/CSRF attacks.
From here we touch upon the recent inclusion of libsodium into PHP, why mcrypt should be avoided, and the side-channel vulnerabilities that brought way to Meltdown and Spectre.
Finally, we mention how computers generate seemingly random numbers, what a Web Application Firewall (WAF) is, and how WARD goes about protecting your systems.
Show Links
Scott Arciszewski on TwitterParagon Initiative EnterprisesThe 2018 Guide to Building Secure PHP SoftwareAre PDO prepared statements sufficient to prevent SQL injection?Preventing SQL Injection in PHP Applicationsparagonie/easydb - Easy-to-use PDO wrapper for PHP projects.Security at the expense of usability comes at the expense of security.Security B-Sides Orlando 2017TimThumb WebShot Code Execution Exploit (Zeroday)Reverse shell !?!paragonie/anti-csrf - Full-Featured Anti-CSRF LibraryUsing Libsodium in PHP Projectsparagonie/sodium_compat - Pure PHP polyfill for ext/sodiumlibsodiumIt Turns Out, 2017 is the Year of Simply Secure PHP CryptographyThe ECB PenguinCache-timing attacks on AESSide-Channel Attacks on Everyday ApplicationsMeltdown and SpectrePCID is now a critical performance/security feature on x86If You’re Typing the Word MCRYPT Into Your PHP Code, You’re Doing It WrongMyths about /dev/urandomPHP - random_bytesPHP - random_intWard - Web Application Realtime Defender