SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsThis is a topic we actually discussed recently in another blog episode [1]. It is no surprise that this topic made it into the "Top 25" [2]. Securing file uploads is hard.
To extend a bit on the earlier blog, let me discuss strategies to win this fight. I believe this is a good example on how integrating security early in your software development is helpful.
Hard problems like file uploads need to be identified early, and the risks have to be spelled out in the project plan. In some cases, it may be possible to avoid the problem by modifying the project requirements. Some of the critical questions to ask are:
Decisions like this have to be made early in the development process. The threat modeling should point out dangerous requirements like file uploads and make everybody aware of the risks involved. At this point, it is usually still pretty easy to avoid some of the major problems. For example, a requirement may be added to limit file uploads to users with specific rolls or the requirement for manual review may be added.
Dr. Johannes Ullrich is the Dean of Research for SANS Technology Institute, a SANS Faculty Fellow, and founder of the Internet Storm Center (DShield.org) which provides a free analysis and warning service to thousands of Internet users and organizations.
Read more about Dr. Johannes Ullrich