The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to clarify the language used within the community.

Abuse of Functionality: An attack technique that uses the features and functionality of a web site to consume, defraud, or circumvent the site셲 access controls. See also 쏡enial of Service.

ActiveX controls: A program, called a 쐁ontrol, developed using ActiveX controls technologies. ActiveX controls controls can be downloaded and executed within technology-enabled Web browsers. ActiveX controls is a set of rules for how applications should share information. ActiveX controls controls can be developed in C, C++, Visual Basic, and Java. See also 쏪ava, 쏪ava Applets, 쏪avaScript, 쏻eb Browser.

AJAX: AJAX stands for Asynchronous JavaScript and XML. This browser based technology allows a website to perform additional resource requests without refreshing the user page by utilizing the XMLHttpRequest Javascript object.

Anti-Automation: Security measure that prevents automated programs from exercising web site functionality by administering the Turing Test to a user, which only a human could pass. See also 쏺isual Verification.

Application Server: A software server, normally using HTTP, which has the ability to execute dynamic web applications. Also known a middleware, this piece of software is normally installed on or near the web server where it can be called upon. See also 쏻eb Application, 쏻eb Server.

Authentication: The process of verifying the identity or location of a user, service or application. Authentication is performed using at least one of three mechanisms: 쐓omething you have, 쐓omething you know or 쐓omething you are. The authenticating application may provide different services based on the location, access method, time of day, etc. See also 쏧nsufficient Authentication.

Authorization: The determination of what resources a user, service or application has permission to access. Accessible resources can be URL셲, files, directories, servlets, databases, execution paths, etc. See also 쏧nsufficient Authorization.

Backup File Disclosure: (Obsolete) See 쏱redictable File Location.

Basic Authentication: A simple form of client-side authentication supported in HTTP. The http-client sends a request header to the web server containing a Base64 encoded username and password. If the username/password combination is valid, the web server grants the client access to the requested resource. See also 쏛uthentication, 쏧nsufficient Authentication.

Brute Force: An automated process of trial and error used to guess the 쐓ecret protecting a system. Examples of these secrets include usernames, passwords or cryptographic keys. See also 쏛uthentication, 쏧nsufficient Authentication, 쏱assword Recover System, 쏻eak Password Recovery Validation.

Buffer Overflow: An exploitation technique that alters the flow of an application by overwriting parts of memory. Buffer Overflows are a common cause of malfunctioning software. If the data written into a buffer exceeds its size, adjacent memory space will be corrupted and normally produce a fault. An attacker may be able to utilize a buffer overflow situation to alter an application's process flow. Overfilling the buffer and rewriting memory-stack pointers could be used to execute arbitrary operating-system commands.
Related Documents
  1. [PodCast] Security Testing (104M) (1071)
  2. [Free] SiteDigger : vulnerabilities, errors, configuration issues, proprietary information, and interesting security testing tool (5465)
  3. [Ebook] Internet Security: A Jumpstart for Systems Administrators and IT Managers (3728)
  4. [Free] skipfish : web application security reconnaissance tool. (2583)
  5. What is a Security stress testing? (2128)
  6. [Ebook] Practical Unix & Internet Security, 3rd Edition (4433)
  7. [Free] Watcher : testing tool and passive vulnerability scanner (2233)
  8. [Webinar] Are You Ready for DO-178C and Emerging Security-Critical Standards? (1365)
  9. Security Focus : Newsletter Archive (1755)
  10. [Ebook] Exploiting Software How to Break Code (3473)
  11. Security Strategies Alert (999)
  12. Web Security Testing Blog (1407)
  13. Creating a Web security testing policy (1972)
  14. Building web application security into your development process (1661)
  15. [Video] seNetsparker - A free web app security testing tool (1002)
  16. How to Test Application Security Web and Desktop Application Security Testing Techniques (3688)
  17. Security Testing for Web Application (2152)
  18. [Ebook] Practical Applications for Security Testing (5229)
  19. [Ebook] Google Hacks : 2nd Edition (2887)
  20. [Ebook] Hacker Attack (3099)