Web Mail Sec
Web Mail Sec
Content:
Remediation:
query = f"SELECT * FROM users WHERE query = "SELECT * FROM users WHERE
conn.close() conn.close()
Input Validated Code
import re
import sqlite3
conn = sqlite3.connect('example.db')
cursor = conn.cursor()
user_input = "alice"
if re.match("^[a-zA-Z0-9_]*$", user_input):
query = "SELECT * FROM users WHERE username = ?"
cursor.execute(query, (user_input,))
print(cursor.fetchone())
else:
print("Invalid input")
conn.close()
Cross-Site Scripting (XSS) (I)
Content:
Description: Attackers inject malicious scripts into web pages viewed by others
Remediation:
@app.route('/') @app.route('/')
def index(): def index():
user_input = user_input =
request.args.get('user_input', '') request.args.get('user_input', '')
safe_input = escape(user_input) safe_input = escape(user_input)
return f'<h1>Hello, return f'<h1>Hello,
{safe_input}!</h1>' {safe_input}!</h1>'
Content:
app = Flask(__name__)
<form method="post"
@app.route('/form', methods=['GET', 'POST'])
action="http://localhost:5000
def form():
if request.method == 'POST':
/form">
return 'Form submitted! ' <input type="hidden"
return ''' name="data" value="malicious
<form method="post" action="/form"> data">
<input type="text" name="data"> <input type="submit">
<input type="submit">
</form>
</form>
'''
if __name__ == '__main__':
app.run(debug=True)
Cross-Site Request Forgery (CSRF) (II)
Remediation:
Content:
Remediation:
Content:
Remediation:
Content:
Content:
Remediation:
Content:
Remediation:
Content:
Remediation:
Content:
Remediation:
Remediation:
Remediation:
Remediation:
Remediation:
Benefits:
Content:
● How It Works:
● Signing: The sending server uses a private key to generate a digital
signature for the email.
● Verification: The receiving server uses the sender's public key
(published in DNS) to verify the signature.
● Integrity: Ensures the email content has not been altered.
DKIM (DomainKeys Identified Mail) (III)
Benefits:
Content:
● Description: DMARC builds on DKIM and SPF, adding reporting and policy enforcement
to combat email spoofing.
● How It Works:
● Alignment: Ensures the "From" header domain matches the domain in DKIM and
SPF records.
● Policies: Defines actions (none, quarantine, reject) for emails that fail DKIM/SPF
checks.
● Reporting: Sends aggregate and forensic reports on email authentication results.
DMARC (Domain-based Message Authentication, Reporting, and Conformance)
Benefits:
Content:
● Integrated Approach:
● SPF: Ensures emails are sent from authorized IP addresses.
● DKIM: Confirms the email's content integrity and verifies the sender's
domain.
● DMARC: Aligns SPF and DKIM results with the "From" header, enforcing
policies and providing reports.
How DKIM, DMARC, and SPF Work Together
Comprehensive Protection:
DMARC:
SPF: