How do I sanitize LDAP input and prevent injection attacks? What LDAP injection scenarios are possible?

In the following C# example I’m querying AD’s configuration container for Exchange overrides. If the domain name in unsanitised the end user could get LDAP to read a different object then intended.

I’m not sure if other actions other th… Continue reading How do I sanitize LDAP input and prevent injection attacks? What LDAP injection scenarios are possible?

Tutorial for SecurityCritical SecurityTransparent and new .NET 4 feature: Level 2

I need a primer for both the legacy (Level 1) .NET 2.0 security attributes and the new .NET 4 (Level 2) ones.

I’m not familiar with the implications of controlling LinkDemand, stack walks, unverifiable code and other items in this Patern … Continue reading Tutorial for SecurityCritical SecurityTransparent and new .NET 4 feature: Level 2