{"id":16,"date":"2011-12-19T20:38:40","date_gmt":"2011-12-20T02:38:40","guid":{"rendered":"http:\/\/hawktech.us\/blog\/?p=16"},"modified":"2011-12-19T20:38:40","modified_gmt":"2011-12-20T02:38:40","slug":"free-ebook-owasp-top-10-for-net-developers","status":"publish","type":"post","link":"https:\/\/hawktech.us\/site\/free-ebook-owasp-top-10-for-net-developers\/","title":{"rendered":"Free eBook: OWASP Top 10 for .NET developers"},"content":{"rendered":"<p>Troy Hunt, a Microsoft MVP, has published a <a href=\"http:\/\/www.troyhunt.com\/2011\/12\/free-ebook-owasp-top-10-for-net.html\" target=\"_blank\" rel=\"noopener noreferrer\">free security eBook for .NET developers<\/a>. \u00a0He spent over a year researching these security vulnerabilities and ended up with a 250+ page eBook. \u00a0He describes in detail the following topics:<\/p>\n<ol>\n<li>Injection<\/li>\n<li>Cross-Site Scripting (XSS)<\/li>\n<li>Broken Authentication and Session Management<\/li>\n<li>Insecure Direct Object References<\/li>\n<li>Cross-Site Request Forgery (CSRF)<\/li>\n<li>Security Misconfiguration<\/li>\n<li>Insecure Cryptography Storage<\/li>\n<li>Failure to Restrict URL Access<\/li>\n<li>Insufficient Transport Layer Protection<\/li>\n<li>Unvalidated Redirects and Forwards<\/li>\n<\/ol>\n<p>If \u00a0you are building websites on Microsoft&#8217;s .NET platform, do yourself a favor and check out Troy&#8217;s excellent <strong>OWASP Top 10 for .NET developers<\/strong>\u00a0eBook <a href=\"http:\/\/www.troyhunt.com\/2011\/12\/free-ebook-owasp-top-10-for-net.html\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Troy Hunt, a Microsoft MVP, has published a free security eBook for .NET developers. \u00a0He spent over a year researching these security vulnerabilities and ended up with a 250+ page eBook. \u00a0He describes in detail the following topics: Injection Cross-Site Scripting (XSS) Broken Authentication and Session Management Insecure Direct Object References Cross-Site Request Forgery (CSRF)&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[59],"tags":[57,58,60],"class_list":["post-16","post","type-post","status-publish","format-standard","hentry","category-ebooks","tag-net","tag-ebook","tag-security"],"_links":{"self":[{"href":"https:\/\/hawktech.us\/site\/wp-json\/wp\/v2\/posts\/16","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hawktech.us\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hawktech.us\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hawktech.us\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hawktech.us\/site\/wp-json\/wp\/v2\/comments?post=16"}],"version-history":[{"count":0,"href":"https:\/\/hawktech.us\/site\/wp-json\/wp\/v2\/posts\/16\/revisions"}],"wp:attachment":[{"href":"https:\/\/hawktech.us\/site\/wp-json\/wp\/v2\/media?parent=16"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hawktech.us\/site\/wp-json\/wp\/v2\/categories?post=16"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hawktech.us\/site\/wp-json\/wp\/v2\/tags?post=16"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}