odin1314 / JavaSecurity

Java web and command line application demo projects for different security topics

Home Page:http://www.dominikschadow.de

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Java Security

This repository contains several Java web applications and command line applications covering different security topics.

Have a look at the slides from various events covering the applications in this repository. The Java Web Security Workshop uses all these applications in much greater detail.

Web Applications in Detail

Some web applications contain exercises. Instructions are provided in detail in each web application.

Using Mozilla Firefox as browser is strongly recommended. Some web applications are based on Spring Boot and can be started via the main method in the Application class or via mvn spring-boot:run . Projects containing a Dockerfile can be launched via docker run -d -i -p 8080:8080 -t dschadow/[PROJECT] after the image has been created. The other web applications either contain an embedded Tomcat7 Maven plugin which can be started via mvn tomcat7:run-war or an embedded Jetty Maven plugin which can be started via mvn jetty:run-war.

access-control-spring-security

Access control demo project utilizing Spring Security in a Spring Boot application. Shows how to safely load user data from a database without using potentially faked frontend values. After launching, open the web application in your browser at http://localhost:8080.

crypto-spring

Crypto demo project based on Spring Boot using Jasypt and jasypt-spring-boot to secure Spring configuration (property) files. Requires a system property (environment variable) jasypt.encryptor.password with the value spring-jasypt present on startup. After launching, open the web application in your browser at http://localhost:8080.

csp-spring-security

Spring Boot based web application using a Content Security Policy (CSP) header. After launching, open the web application in your browser at http://localhost:8080.

csrf-spring-security

Cross-Site Request Forgery (CSRF) demo project based on Spring Boot preventing CSRF in a web application by utilizing Spring Security. After launching, open the web application in your browser at http://localhost:8080.

csrf

Cross-Site Request Forgery (CSRF) demo project preventing CSRF in a JavaServer Pages (JSP) web application. Sample code is based on the Enterprise Security API (ESAPI). After launching, open the web application in your browser at http://localhost:8080/csrf.

direct-object-references

Direct object references (and indirect object references) demo project using Spring Boot. Sample code is based on the Enterprise Security API (ESAPI). After launching, open the web application in your browser at http://localhost:8080.

intercept-me

Spring Boot based web application to experiment with OWASP ZAP as intercepting proxy. Target is to receive SUCCESS from the backend. After launching, open the web application in your browser at http://localhost:8080.

security-header

Security response header demo project which applies X-Content-Type-Options, Cache-Control, X-Frame-Options, HTTP Strict Transport Security (HSTS), X-XSS-Protection and Content Security Policy (CSP) (Level 1 and 2) headers to HTTP responses. After launching, open the web application in your browser at http://localhost:8080/security-header or https://localhost:8443/security-header.

security-logging

Security logging demo project based on the OWASP Security Logging Project. After launching, open the web application in your browser at http://localhost:8080/security-logging.

session-handling-spring-security

Session handling demo project based on Spring Boot utilizing Spring Security. Shows how to restrict access to resources (URLs), how to apply method level security and how to securely store and verify passwords. Uses Spring Security for all security related functionality. After launching, open the web application in your browser at http://localhost:8080.

session-handling

Session handling demo project using plain Java. Uses plain Java to create and update the session id after logging in. Requires a web server with Servlet 3.1 support. After launching, open the web application in your browser at http://localhost:8080/session-handling.

sql-injection

Spring Boot based web application to experiment with normal (vulnerable) statements, statements with escaped input, and prepared statements. After launching, open the web application in your browser at http://localhost:8080.

sso-with-github

Contains a Spring Boot demo application with GitHub login. Requires to setup an application in your GitHub account and to provide github.client.clientId and github.client.clientSecret as runtime parameters. After launching, open the web application in your browser at http://localhost:8080.

xss

Cross-Site Scripting (XSS) demo project preventing XSS in a JavaServer Pages (JSP) web application by utilizing input validation, output escaping with OWASP Java Encoder and the Content Security Policy (CSP). After launching, open the web application in your browser at http://localhost:8080/xss.

Command Line Applications in Detail

All projects contain main methods to get started.

crypto-hash

Crypto demo project using Java to hash passwords with different hashing algorithms. All classes contain main methods to execute the samples.

crypto-java

Crypto demo project using plain Java to encrypt and decrypt data with asymmetric (RSA) and symmetric (AES) keys as well as to sign and verify data (DSA). All classes contain main methods to execute the samples.

crypto-keyczar

Crypto demo project using Keyczar to encrypt and decrypt data with asymmetric (RSA) and symmetric (AES) keys as well as to sign and verify data (DSA). All classes contain main methods to execute the samples.

crypto-shiro

Crypto demo project using Apache Shiro to encrypt and decrypt data with symmetric (AES) keys as well as hash data (passwords). All classes contain main methods to execute the samples.

Meta

Build Status License

About

Java web and command line application demo projects for different security topics

http://www.dominikschadow.de

License:Apache License 2.0


Languages

Language:Java 87.6%Language:HTML 11.8%Language:CSS 0.6%Language:JavaScript 0.0%