当前位置:网站首页>Network security learning notes 01 network security foundation
Network security learning notes 01 network security foundation
2022-07-01 11:05:00 【I'm not zzy1231a】
Learning notes The main content is information security /web Security / Penetration test
domain name
A domain name is a string of names separated by dots Internet The name of a computer or computer group on , Locate the computer during data transmission .
Secondary domain name classification 
DNS The domain name system
The domain name system (Domain Name System). It is a domain name and IP A distributed database with address mapping , Make it easier for people to access the Internet .DNS Use UDP port 53. The limit for the length of each level of domain name is 63 Characters , The total length of the domain name cannot exceed 253 Characters .
When we visit a domain name , The system will automatically start from Hosts Look for the corresponding IP Address , Once found , The system will immediately open the corresponding web page , If not found , Then the system will submit the website again DNS Domain name resolution server IP Address resolution .
CDN:Content Delivery Network, The content distribution network . It is a distributed content distribution network built on data network . It can improve the response speed of the system , It can also intercept to a certain extent /f Defense attacks
Common domain name attacks :DNS ddos Domain name hijacking DNS hijacked Cache poisoning
WEB Basics
WEB Source class corresponding vulnerabilities :SQL Inject , Upload ,XSS, Code execution , Variable coverage , Logical loopholes , Deserialization, etc
WEB Middleware corresponding vulnerabilities : Unauthorized access , Variable coverage
WEB Database corresponding vulnerabilities : Weak password , Elevated privileges
WEB System layer corresponding vulnerabilities : Raise the right , Remote code execution
Penetration test
Penetration test , also called “ White hat hacker ” test , For the purpose of enhancing security , Use the same technology as malicious attackers 、 Strategies and means , Investigate the security of a given organization 、 Evaluation and testing
Penetration testers are well trained 、 Rich skills , A security expert who can understand system weaknesses and locate them . By adopting a comprehensive set of technologies 、 The procedures of administrative and physical means resist the loopholes in the system :
Technical means : Virtual private network (VPN)、 Cryptographic protocol 、 intrusion detection system 、 Intrusion prevention system 、 Access control list 、 Biometric technology 、 Smart card technology and other devices to improve security ;
Administrative means include the application of policies 、 Rules strengthen rules ;
Physical means include cable locks 、 Device lock 、 Alarm system, etc .
Scripting language
Scripting language is also called extended language , Or dynamic language , Is a programming language , Used to control software applications .
asp php aspx jsp javaweb pl py cgi etc.
Script (asp,php,jsp)( Dynamic scripting language )
html(scc,js,html)( Static scripting language )
Static scripts do not interact with the database , It runs directly on the local browser , And it's very fast , But you can directly view the source code ;
Dynamic scripts interact with databases , Is running on the web Server , The execution result is displayed ( You can also run in the browser , Source code can be seen )
Reference material :
official account 0x00 laboratory , Interested friends suggest reading tweets
边栏推荐
- 银行卡借给别人是否构成犯罪
- In June 2022, it was the first programming language?!
- 编译调试Net6源码
- Intel Labs annonce de nouveaux progrès en photonique intégrée
- 力扣(LeetCode)181. 超过经理收入的员工(2022.06.29)
- 12款大家都在用的产品管理平台
- LeetCode. One question of the day: offer II 091 Paint the house (DP problem)
- CVPR 2022 | Virtual Correspondence: Humans as a Cue for Extreme-View Geometry
- 678. Valid bracket string
- Give up high paying jobs in Shenzhen and go back home
猜你喜欢

MIT最新论文《对可解释特征的需求:动机和分类》:在机器学习模型的组成元素中建立可解释性

LeetCode. 515. Find the maximum value in each tree row___ BFS + DFS + BFS by layer

Oracle和JSON的結合

Google's new paper Minerva: solving quantitative reasoning problems with language models

Error: missing revert data in call exception

Wireshark TS | confusion between fast retransmission and out of sequence

中国探月工程独家藏品限量发售!

移动硬盘驱动器读到,但不显示盘符
![[.net6] use ml.net+onnx pre training model to liven the classic](/img/b3/b117481fba7257453011e4cdb1eaaa.png)
[.net6] use ml.net+onnx pre training model to liven the classic "Huaqiang buys melons" in station B

云上“视界” 创新无限 | 2022阿里云直播峰会正式上线
随机推荐
我国蜂窝物联网用户已达 15.9 亿,年内有望超越移动电话用户
Cvpr22 | CMT: efficient combination of CNN and transformer (open source)
商城小程序源码开源版-可二开
"Target detection" + "visual understanding" to realize the understanding and translation of the input image (with source code)
When is testing not unit testing- When is a Test not a Unit-test?
CVPR22 |CMT:CNN和Transformer的高效结合(开源)
Valgrind usage of memory leak locating tool
12款大家都在用的產品管理平臺
技术分享 | Linkis参数介绍
LeetCode. One question of the day: offer II 091 Paint the house (DP problem)
Mobile hard drive reads but does not display drive letter
bash: ln: command not found
Combinaison Oracle et json
Recommend a JSON visualization tool artifact!
个人商城二开逍遥B2C商城系统源码-可商用版/拼团拼购优惠折扣秒杀源码
2022年已经过去一半了,是不是很突然呢?
Suggest collecting | what to do when encountering slow SQL on opengauss?
Handling distributed transactions with powerful dbpack (PHP tutorial)
CVPR 2022 | self enhanced unpaired image defogging based on density and depth decomposition
Detailed explanation of linear regression in machine learning