session_regenerate_id
I do not think there is an equivalent. Sessions are short-lived, therefore, if an attacker entered the session on time, this should also happen after changing the access level.
Something extra is that sessions are not intended to authenticate a user in asp.net. When using user authentication, forms authentication is used.
It is said above that everything you do depends on the person in the medium attack. This is true for many sites, so cookie grabbing is a problem in everything.
When you do something special, ask the user to enter their password again / which must be done via https. If you need to perform a number of special operations, you can do it once, but from now on, requests / cookies should be sent via https. In this context, you can fix a cookie with a modified authentication form that provides access to special operations and requires https.
I believe in MVC, using the <%:%> tags in a view does the same.
Yes, such an equivalent <% = Html.HtmlEncode (someString)%> / with something extra to prevent double coding (you should study this).
Use regEx to find and remove calls to the eval () function.
In .net you do not have such shorthand with such wide access. If you are clearly not doing anything unusual, you are most likely in order.
Directory traversal (possibly related to above)
Use MapPath and the like. This actually prevents going beyond the limits of the site folder. This suggests that you avoid getting paths at all, since you can still provide unintentional access to special files inside the asp.net folder. Actually, this is part of what happened to the Microsoft handler in the offensive scroll vulnerability there - more on my blog
You can add CSRF to the list.
Use the anti-fake token: http://blog.stevensanderson.com/2008/09/01/prevent-cross-site-request-forgery-csrf-using-aspnet-mvcs-antiforgerytoken-helper/
insult attack:
Apply the work around and then the patch as soon as it comes out.
Find out about everything I mention here: asp.net padding oracle: how does this relate to getting web.config, faking cookies and reading other sensitive data . Understanding all of this is important, especially if you use any functions, that is, you donβt want anyone to put sensitive data into the viewing state :)