1. OWASP Foundation
"LDAP Injection Prevention Cheat Sheet." This document specifies that LDAP injection targets applications that use LDAP queries. It states
"LDAP injection is an attack used to exploit web applications that construct LDAP statements from user input." This highlights its specificity to LDAP backends
which are distinct from the typical databases used for application data. (Reference: OWASP LDAP Injection Prevention Cheat Sheet
Introduction section).
2. OWASP Foundation
"Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet." This resource describes CSRF as an attack that "forces an end user to execute unwanted actions." While primarily for performing actions
a crafted request can cause data to be sent to an attacker
making it a method to facilitate data theft. (Reference: OWASP Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet
Introduction section).
3. Martin
M.
et al. (2012). 6.858 Computer Systems Security
Fall 2014. Massachusetts Institute of Technology: MIT OpenCourseWare. Lecture 13
"Web Security
" details how SQL Injection and Cross-Site Scripting are used to exfiltrate data from databases and user sessions
respectively. It establishes them as common data theft vectors in web applications. (Reference: MIT OCW
6.858
Fall 2014
Lecture 13 Notes
Sections 3 & 4).