HTTP/HTTPS কীভাবে কাজ করে থেকে শুরু করে SQL Injection, XSS, CSRF, SSRF, Authentication Bypass, API Security, WAF Bypass এবং Bug Bounty পর্যন্ত — Web Security-র সম্পূর্ণ educational গাইড। From how HTTP/HTTPS works to SQL Injection, XSS, CSRF, SSRF, Authentication Bypass, API Security, WAF Bypass, and Bug Bounty — a complete educational guide to Web Security.
| Method | কাজPurpose | Security ConcernSecurity Concern |
|---|---|---|
GET | Data পড়া, URL-এ parametersRead data, parameters in URL | Sensitive data URL-এ যেও না |
POST | Data পাঠানো, form submitSend data, form submit | CSRF এর লক্ষ্য |
PUT | Resource আপডেটUpdate resource | Authorization check করো |
DELETE | Resource মুছে ফেলাDelete resource | IDOR vulnerability |
OPTIONS | Allowed methods দেখাView allowed methods | CORS misconfiguration |
User input সরাসরি SQL query-তে ঢোকানো হলে attacker সেই query পরিবর্তন করতে পারে। এটি database-এর সমস্ত data চুরি, মুছে দেওয়া বা পরিবর্তন করতে পারে।When user input is directly inserted into a SQL query, an attacker can modify that query. This can lead to stealing, deleting, or modifying all database data.
Server URL parameter থেকে সরাসরি response-এ include করে। Link-এ click করলে ঘটে। শুধু নির্দিষ্ট ব্যক্তিকে affect করে।Server includes URL parameter directly in response. Happens when clicking a link. Affects only the specific person.
Script database-এ save হয় এবং যে কেউ সেই page দেখলে execute হয়। সবচেয়ে বিপজ্জনক — comment, profile, forum-এ হয়।Script is saved to the database and executes for anyone who views the page. Most dangerous — occurs in comments, profiles, forums.
Client-side JavaScript DOM manipulate করে সৃষ্টি হয়। Server দেখতে পায় না, WAF bypass করা সহজ।Created by client-side JavaScript manipulating the DOM. The server doesn't see it, easier to bypass WAF.
Victim যখন attacker-এর site visit করে, তখন সেই site victim-এর browser দিয়ে target site-এ authenticated request পাঠায় — victim জানেই না।When a victim visits the attacker's site, that site sends an authenticated request to the target site using the victim's browser — without the victim knowing.
Server-কে দিয়ে internal network বা cloud metadata access করানো। AWS EC2-তে এটি credential চুরির সবচেয়ে বড় উপায়।Tricking the server into accessing internal networks or cloud metadata. On AWS EC2, this is the biggest way to steal credentials.
Object ID সরাসরি URL বা parameter-এ থাকে এবং server authorization check করে না। Bug Bounty-তে সবচেয়ে বেশি পাওয়া vulnerability।Object IDs are directly in URLs or parameters and the server doesn't check authorization. The most commonly found vulnerability in Bug Bounty.
| সমস্যাProblem | সমাধানSolution |
|---|---|
| Broken Object Level AuthBroken Object Level Auth | প্রতিটি object access-এ authorization check করোCheck authorization for every object access |
| Broken AuthBroken Auth | Strong JWT, rate limiting, account lockoutStrong JWT, rate limiting, account lockout |
| Excessive Data ExposureExcessive Data Exposure | শুধু দরকারি fields return করোReturn only necessary fields |
| Rate Limiting নেইNo Rate Limiting | IP ও user-based rate limit implement করোImplement IP and user-based rate limits |
| Broken Function Level Auth | Admin endpoints সবার কাছে expose করো নাDon't expose admin endpoints to everyone |
| বিভাগCategory | করণীয়Action | অগ্রাধিকারPriority |
|---|---|---|
| Input Validation | সব user input validate ও sanitize করোValidate and sanitize all user input | CRITICAL |
| SQL | Prepared statements সবসময়Always use prepared statements | CRITICAL |
| Output Encoding | HTML encode করো outputHTML encode output | CRITICAL |
| Authentication | MFA, account lockout, bcrypt | CRITICAL |
| HTTPS | সব traffic HTTPS-এAll traffic over HTTPS | CRITICAL |
| Security Headers | CSP, HSTS, X-Frame-Options | HIGH |
| Error Handling | Stack trace user-কে দেখাবে নাDon't show stack traces to users | HIGH |
| Dependencies | নিয়মিত update করোUpdate regularly | HIGH |
| Logging | Auth ও sensitive actions log করোLog auth and sensitive actions | MEDIUM |
শুরুতে VDP (Vulnerability Disclosure Program) দিয়ে শেখোStart with VDP (Vulnerability Disclosure Programs) to learn
| Platform | বিবরণDescription | Link |
|---|---|---|
| PortSwigger Web Academy | সেরা free web security labsBest free web security labs | portswigger.net/web-security |
| DVWA | Local vulnerable app — beginners-এর জন্যLocal vulnerable app — for beginners | dvwa.co.uk |
| HackTheBox | Real-world CTF machinesReal-world CTF machines | hackthebox.com |
| TryHackMe | Guided web hacking roomsGuided web hacking rooms | tryhackme.com |
| PentesterLab | Structured web exercisesStructured web exercises | pentesterlab.com |
| OWASP Juice Shop | Intentionally vulnerable appIntentionally vulnerable app | owasp.org/juice-shop |
সম্পূর্ণ শিক্ষামূলক উদ্দেশ্যে। শুধুমাত্র authorized environment ও নিজের application-এ test করো। Entirely for educational purposes. Only test in authorized environments and on your own applications.
v1.0 — Web Security | Basics to Advanced | Bilingual | 12 Chapters + Cheat Sheet