Skip to main content

Posts

Showing posts with the label Disabling HTTP compression

How To Prevent BREACH Attack in ASP.NET MVC 5 Apps?

BREACH attack - 1.      Disabling HTTP compression 2.      Separating secrets from user input 3.      Randomizing secrets per request 4.      Masking secrets (effectively randomizing by XORing with a random secret per request) 5.      Protecting vulnerable pages with CSRF 6.      Length hiding (by adding random number of bytes to the responses) 7.      Rate-limiting the requests This is reported by this tool - https://acunetix.com/ How To Prevent BREACH attacks in ASP.NET MVC 5 Apps? How do we implement them? The Points will need to be Implements to Prevent the BREACH Attacks - 1.      Implement the CSRF attacks on every form. 2.      Encrypt all sensitive information within the response body. 3.      Disabling HTTP compression in IIS and the BREACH ATTACH issu...