Preparation
Security:
-
Computer Security in the Real World, by Butler Lampson, up-to-and-including Section 2 (6 pages)
-
Book, by Fred B. Schneider, Chapter 1, up-to-and-including section 1.2 (we’ll read the rest later) (9 pages)
Attackers:
-
The Security Mindset (1 page)
-
Malware, section 2 (4 pages)
Web:
-
Using curl to Automate HTTP Jobs, by creator of curl, Sections 1-5 (6 pages)
Attacks:
-
Dynamic Evaluation, focus on the examples (1 page)
-
Insecure Deserialization (3 pages)
-
Cross-Site Scripting (3 pages)
Further Reading
-
Web, by Willard Rafnsson (lecture in "Introductory Programming" 2018) (1:56:36)
-
The Basics of Web Application Security, by Cairns & Somerfield
-
OWASP Top Ten Web Application Security Risks (see e.g. Injection, Insecure Deserialization, XSS)
-
Insecure Deserialization Attack on a Node.js backend (4 pages)
-
Cross-Site Scripting Attack: Self-Retweeting Tweet, by Computerphile (6:16)
-
Cross-Site Scripting Attack: Cookie Stealing (aka. Session Hijacking) (7:23)