当前位置:网站首页>Network security learning notes 01 network security foundation
Network security learning notes 01 network security foundation
2022-07-01 11:05:00 【I'm not zzy1231a】
Learning notes The main content is information security /web Security / Penetration test
domain name
A domain name is a string of names separated by dots Internet The name of a computer or computer group on , Locate the computer during data transmission .
Secondary domain name classification
DNS The domain name system
The domain name system (Domain Name System). It is a domain name and IP A distributed database with address mapping , Make it easier for people to access the Internet .DNS Use UDP port 53. The limit for the length of each level of domain name is 63 Characters , The total length of the domain name cannot exceed 253 Characters .
When we visit a domain name , The system will automatically start from Hosts Look for the corresponding IP Address , Once found , The system will immediately open the corresponding web page , If not found , Then the system will submit the website again DNS Domain name resolution server IP Address resolution .
CDN:Content Delivery Network, The content distribution network . It is a distributed content distribution network built on data network . It can improve the response speed of the system , It can also intercept to a certain extent /f Defense attacks
Common domain name attacks :DNS ddos Domain name hijacking DNS hijacked Cache poisoning
WEB Basics
WEB Source class corresponding vulnerabilities :SQL Inject , Upload ,XSS, Code execution , Variable coverage , Logical loopholes , Deserialization, etc
WEB Middleware corresponding vulnerabilities : Unauthorized access , Variable coverage
WEB Database corresponding vulnerabilities : Weak password , Elevated privileges
WEB System layer corresponding vulnerabilities : Raise the right , Remote code execution
Penetration test
Penetration test , also called “ White hat hacker ” test , For the purpose of enhancing security , Use the same technology as malicious attackers 、 Strategies and means , Investigate the security of a given organization 、 Evaluation and testing
Penetration testers are well trained 、 Rich skills , A security expert who can understand system weaknesses and locate them . By adopting a comprehensive set of technologies 、 The procedures of administrative and physical means resist the loopholes in the system :
Technical means : Virtual private network (VPN)、 Cryptographic protocol 、 intrusion detection system 、 Intrusion prevention system 、 Access control list 、 Biometric technology 、 Smart card technology and other devices to improve security ;
Administrative means include the application of policies 、 Rules strengthen rules ;
Physical means include cable locks 、 Device lock 、 Alarm system, etc .
Scripting language
Scripting language is also called extended language , Or dynamic language , Is a programming language , Used to control software applications .
asp php aspx jsp javaweb pl py cgi etc.
Script (asp,php,jsp)( Dynamic scripting language )
html(scc,js,html)( Static scripting language )
Static scripts do not interact with the database , It runs directly on the local browser , And it's very fast , But you can directly view the source code ;
Dynamic scripts interact with databases , Is running on the web Server , The execution result is displayed ( You can also run in the browser , Source code can be seen )
Reference material :
official account 0x00 laboratory , Interested friends suggest reading tweets
边栏推荐
- 2022年已经过去一半了,是不是很突然呢?
- CVPR 2022 | self enhanced unpaired image defogging based on density and depth decomposition
- Internal control of fund managers
- Give up high paying jobs in Shenzhen and go back home
- 力扣(LeetCode)181. 超过经理收入的员工(2022.06.29)
- Recommend a JSON visualization tool artifact!
- Technology sharing | introduction to linkis parameters
- Handling distributed transactions with powerful dbpack (PHP tutorial)
- mysql如何把 一个数据库中的表数据 复制到 另一个数据库中(两个数据库不在同一个数据库链接下)
- Database experiment report (II)
猜你喜欢
【MAUI】为 Label、Image 等控件添加点击事件
《百年巨匠》数字藏品中奖名单公布
Sqlachemy common operations
Intel Labs announces new progress in integrated photonics research
YoDA统一数据应用——融合计算在蚂蚁风险场景下的探索与实践
The idea runs with an error command line is too long Shorten command line for...
Recommend a JSON visualization tool artifact!
数据库实验报告(二)
[paper reading] trajectory guided control prediction for end to end autonomous driving: a simple yet strong Ba
Oracle和JSON的结合
随机推荐
Rising Stars in Plant Sciences (RSPS2022) Finalist科学演讲会(6.30晚9点)
Internal control of fund managers
Personal mall two open Xiaoyao B2C mall system source code - Commercial Version / group shopping discount seckill source code
Recommend a JSON visualization tool artifact!
China's cellular Internet of things users have reached 1.59 billion, and are expected to surpass mobile phone users within this year
How to get the maximum value of column two and regenerate the table when the SQL Server column one is the same
flutter path_provider: ^2.0.10可以获取临时目录
力扣(LeetCode)181. 超过经理收入的员工(2022.06.29)
NC | intestinal cells and lactic acid bacteria work together to prevent Candida infection
Cvpr22 | CMT: efficient combination of CNN and transformer (open source)
In June 2022, it was the first programming language?!
When is testing not unit testing- When is a Test not a Unit-test?
Error: missing revert data in call exception
Website source code whole site download website template source code download
Leetcode 181 Employees exceeding the manager's income (June 29, 2022)
[.net6] use ml.net+onnx pre training model to liven the classic "Huaqiang buys melons" in station B
【MAUI】为 Label、Image 等控件添加点击事件
"Target detection" + "visual understanding" to realize the understanding and translation of the input image (with source code)
“目标检测”+“视觉理解”实现对输入图像的理解及翻译(附源代码)
Is it safe to open a stock account online in 2022? Is there any danger?