当前位置:网站首页>Network security learning notes 01 network security foundation
Network security learning notes 01 network security foundation
2022-07-01 11:05:00 【I'm not zzy1231a】
Learning notes The main content is information security /web Security / Penetration test
domain name
A domain name is a string of names separated by dots Internet The name of a computer or computer group on , Locate the computer during data transmission .
Secondary domain name classification 
DNS The domain name system
The domain name system (Domain Name System). It is a domain name and IP A distributed database with address mapping , Make it easier for people to access the Internet .DNS Use UDP port 53. The limit for the length of each level of domain name is 63 Characters , The total length of the domain name cannot exceed 253 Characters .
When we visit a domain name , The system will automatically start from Hosts Look for the corresponding IP Address , Once found , The system will immediately open the corresponding web page , If not found , Then the system will submit the website again DNS Domain name resolution server IP Address resolution .
CDN:Content Delivery Network, The content distribution network . It is a distributed content distribution network built on data network . It can improve the response speed of the system , It can also intercept to a certain extent /f Defense attacks
Common domain name attacks :DNS ddos Domain name hijacking DNS hijacked Cache poisoning
WEB Basics
WEB Source class corresponding vulnerabilities :SQL Inject , Upload ,XSS, Code execution , Variable coverage , Logical loopholes , Deserialization, etc
WEB Middleware corresponding vulnerabilities : Unauthorized access , Variable coverage
WEB Database corresponding vulnerabilities : Weak password , Elevated privileges
WEB System layer corresponding vulnerabilities : Raise the right , Remote code execution
Penetration test
Penetration test , also called “ White hat hacker ” test , For the purpose of enhancing security , Use the same technology as malicious attackers 、 Strategies and means , Investigate the security of a given organization 、 Evaluation and testing
Penetration testers are well trained 、 Rich skills , A security expert who can understand system weaknesses and locate them . By adopting a comprehensive set of technologies 、 The procedures of administrative and physical means resist the loopholes in the system :
Technical means : Virtual private network (VPN)、 Cryptographic protocol 、 intrusion detection system 、 Intrusion prevention system 、 Access control list 、 Biometric technology 、 Smart card technology and other devices to improve security ;
Administrative means include the application of policies 、 Rules strengthen rules ;
Physical means include cable locks 、 Device lock 、 Alarm system, etc .
Scripting language
Scripting language is also called extended language , Or dynamic language , Is a programming language , Used to control software applications .
asp php aspx jsp javaweb pl py cgi etc.
Script (asp,php,jsp)( Dynamic scripting language )
html(scc,js,html)( Static scripting language )
Static scripts do not interact with the database , It runs directly on the local browser , And it's very fast , But you can directly view the source code ;
Dynamic scripts interact with databases , Is running on the web Server , The execution result is displayed ( You can also run in the browser , Source code can be seen )
Reference material :
official account 0x00 laboratory , Interested friends suggest reading tweets
边栏推荐
- The list of winners of the digital collection of "century master" was announced
- 我国蜂窝物联网用户已达 15.9 亿,年内有望超越移动电话用户
- Half of 2022 has passed, isn't it sudden?
- 使用强大的DBPack处理分布式事务(PHP使用教程)
- 《百年巨匠》数字藏品中奖名单公布
- 关于Keil编译程序出现“File has been changed outside the editor,reload?”的解决方法
- LeetCode.每日一题 剑指 Offer II 091. 粉刷房子 (DP问题)
- Recommend a JSON visualization tool artifact!
- JS foundation -- data type
- Cvpr22 | CMT: efficient combination of CNN and transformer (open source)
猜你喜欢

node版本管理器nvm安装及切换

mysql如何把 一个数据库中的表数据 复制到 另一个数据库中(两个数据库不在同一个数据库链接下)

kubernetes之ingress探索实践

【AI资讯月刊】350+资源大盘点!6月不容错过的资料和动态,都都都在这里啦!<附下载>

2022年6月编程语言排行,第一名居然是它?!

商城小程序源码开源版-可二开

Ten years of sharpening a sword: unveiling the secrets of ant group's observability platform antmonitor

Combinaison Oracle et json

Wireshark TS | confusion between fast retransmission and out of sequence

全局过滤器(处理时间格式)
随机推荐
442. duplicate data in array
软件项目管理 9.2.软件项目配置管理过程
Intel Labs annonce de nouveaux progrès en photonique intégrée
Website source code whole site download website template source code download
flutter Uint8List格式的图片和File格式图片的互相转换
LeetCode. 515. Find the maximum value in each tree row___ BFS + DFS + BFS by layer
Uncover the secrets of new products! Yadi Guanneng 3 multi product matrix to meet the travel needs of global users
flutter path_ Provider: ^2.0.10 can get temporary directory
When is testing not unit testing- When is a Test not a Unit-test?
Wireshark TS | 快速重传和乱序之混淆
The first anniversary of the data security law, which four major changes are coming?
12款大家都在用的产品管理平台
12 plateformes de gestion de produits utilisées par tout le monde
China's cellular Internet of things users have reached 1.59 billion, and are expected to surpass mobile phone users within this year
MIT最新论文《对可解释特征的需求:动机和分类》:在机器学习模型的组成元素中建立可解释性
银行卡借给别人是否构成犯罪
CVPR22 |CMT:CNN和Transformer的高效结合(开源)
CPI教程-异步接口创建及使用
Huawei Equipment configure les services de base du réseau WLAN à grande échelle
Is it safe to open a stock account online in 2022? Is there any danger?