Home - rinku191/AppSec_Topics_for_Interview GitHub Wiki

AppSec_Topics_URLs_for_Interview wiki!

Topic URLs Note
CORS Concept https://github.com/rinku191/AppSec_Topics_for_Interview/wiki/CORS-Concept
HTTP Security Headers https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP, https://www.searchenginejournal.com/http-security-headers/#415404/close , https://www.keycdn.com/support/what-is-mime-sniffing
Same Origin Policy https://web.dev/same-origin-policy/ ,https://en.wikipedia.org/wiki/Same-origin_policy
Cookie https://www.javatpoint.com/http-cookies , https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies A cookie has been set without the “samesite” attribute treat as cross site cookie communication.
SSL handshaking https://www.ibm.com/docs/en/ibm-mq/7.5?topic=ssl-overview-tls-handshake , https://www.ibm.com/docs/en/ibm-mq/7.5?topic=ssl-how-tls-provide-authentication-confidentiality-integrity
Perfect forward Secrecy http://www.cs.sjsu.edu/faculty/pollett/masters/Semesters/Fall13/akash/PFS_Presentation.pdf
Certification chain verification https://docs.apigee.com/how-to-guides/validating-certificate-chain
Code Signing https://codesigningstore.com/how-code-signing-certificate-works
Same Site https://web.dev/samesite-cookies-explained/
Cross Site https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/
CSRF mitigation https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html ,https://security.stackexchange.com/questions/90023/get-and-post-request-vulnerable-to-csrf-attack Note: GET and POST method does not send pre-flight request. PUT & DELETE send. In some case POST also sends pre-flight when HTTP customs header is set or requests are JSON/XML.
Oauth https://connect2id.com/learn/oauth-2 , https://dropbox.tech/developers/pkce--what-and-why,
Oauth, Server to Server Communication https://www.oauth.com/oauth2-servers/access-tokens/client-credentials/
Template Injection https://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection
XXE https://www.acunetix.com/blog/articles/xml-external-entity-xxe-vulnerabilities/
Software signing https://codesigningstore.com/how-code-signing- certificate-works
DLL Injection https://i.blackhat.com/USA-19/Thursday/us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All-wp.pdf
NTLM https://www.crowdstrike.com/cybersecurity-101/ntlm-windows-new-technology-lan-manager/
Kerberos https://en.wikipedia.org/wiki/Kerberos_protocol
NTLM VS Kerbros vs lady https://ramprasadtech.com/difference-between-ntlm-kerberos-ldap-authentication/
Digital Rights Management(DRM) https://imagen.io/blog/what-is-digital-rights-management/ SetWindowDisplayAffinity API->For disabling screen capture in windows
Re-captcha https://datadome.co/learning-center/invisible-recaptcha-choosing-recaptcha/ ,https://security.stackexchange.com/questions/184619/prevent-against-otp-abuse-in-app-sign-up-flow, https://www.digitalocean.com/community/tutorials/how-to-integrate-google-recaptcha-in-java-web-application , https://www.quora.com/How-does-the-new-invisible-captcha-work
C vulnerable code snippet https://vimeo.com/30001189
Frida tool use https://www.ired.team/miscellaneous-reversing-forensics/windows-kernel-internals/instrumenting-windows-apis-with-frida
Red Team activity useful for Thick client Pentest https://www.ired.team/offensive-security/code-execution
Android fundamental https://developer.android.com/guide/components/fundamentals
Android ART, Dalvik, JVM https://medium.com/android-news/virtual-machine-in-android-everything-you-need-to-know-9ec695f7313b
SSL Pinning https://tech.groww.in/ssl-pinning-in-android-part-2-b591dfc8c2f1
Common-android-vulnerabilities https://drive.google.com/file/d/1IOhRBYUAqGWE-MigR8hyENYe_2LA1tgo/view?usp=sharing
Oauth Mobile https://medium.com/l-r-engineering/oauth2-in-android-authorization-code-flow-ffc4355dd473 , https://auth0.com/docs/get-started/authentication-and-authorization-flow/authorization-code-flow-with-proof-key-for-code-exchange-pkce ,https://oauth.net/2/grant-types/implicit/
Android vul list https://github.com/muellerberndt/android_app_security_checklist
Biometric Auth https://proandroiddev.com/biometric-authentication-with-backend-verification-6feaa0188963
Regular expression https://developer.mozilla.org/en-US/docs/Web/JavaScript/Guide/Regular_Expressions , https://www.regextester.com/ (.* vs .*?) Suppose I take a string like? "can cats eat plants?" Using the greedy c.s will match the entire string since it starts with c and ends with s, being a greedy operator it continues to match until the final occurrence of s is found, i.e."can cats eat plants". Whereas using the lazy c.?s will only match until the first occurrence of s is found, i.e. string "can cats".
SAML Concept https://github.com/rinku191/AppSec_Topics_for_Interview/wiki/SAML-Concept-and-Security
Design review some key points https://github.com/rinku191/AppSec_Concept_URLs_for_Interview_Preparation/wiki/Design-review-some-key-points