当前位置:网站首页>Network security learning notes 01 network security foundation
Network security learning notes 01 network security foundation
2022-07-01 11:05:00 【I'm not zzy1231a】
Learning notes The main content is information security /web Security / Penetration test
domain name
A domain name is a string of names separated by dots Internet The name of a computer or computer group on , Locate the computer during data transmission .
Secondary domain name classification 
DNS The domain name system
The domain name system (Domain Name System). It is a domain name and IP A distributed database with address mapping , Make it easier for people to access the Internet .DNS Use UDP port 53. The limit for the length of each level of domain name is 63 Characters , The total length of the domain name cannot exceed 253 Characters .
When we visit a domain name , The system will automatically start from Hosts Look for the corresponding IP Address , Once found , The system will immediately open the corresponding web page , If not found , Then the system will submit the website again DNS Domain name resolution server IP Address resolution .
CDN:Content Delivery Network, The content distribution network . It is a distributed content distribution network built on data network . It can improve the response speed of the system , It can also intercept to a certain extent /f Defense attacks
Common domain name attacks :DNS ddos Domain name hijacking DNS hijacked Cache poisoning
WEB Basics
WEB Source class corresponding vulnerabilities :SQL Inject , Upload ,XSS, Code execution , Variable coverage , Logical loopholes , Deserialization, etc
WEB Middleware corresponding vulnerabilities : Unauthorized access , Variable coverage
WEB Database corresponding vulnerabilities : Weak password , Elevated privileges
WEB System layer corresponding vulnerabilities : Raise the right , Remote code execution
Penetration test
Penetration test , also called “ White hat hacker ” test , For the purpose of enhancing security , Use the same technology as malicious attackers 、 Strategies and means , Investigate the security of a given organization 、 Evaluation and testing
Penetration testers are well trained 、 Rich skills , A security expert who can understand system weaknesses and locate them . By adopting a comprehensive set of technologies 、 The procedures of administrative and physical means resist the loopholes in the system :
Technical means : Virtual private network (VPN)、 Cryptographic protocol 、 intrusion detection system 、 Intrusion prevention system 、 Access control list 、 Biometric technology 、 Smart card technology and other devices to improve security ;
Administrative means include the application of policies 、 Rules strengthen rules ;
Physical means include cable locks 、 Device lock 、 Alarm system, etc .
Scripting language
Scripting language is also called extended language , Or dynamic language , Is a programming language , Used to control software applications .
asp php aspx jsp javaweb pl py cgi etc.
Script (asp,php,jsp)( Dynamic scripting language )
html(scc,js,html)( Static scripting language )
Static scripts do not interact with the database , It runs directly on the local browser , And it's very fast , But you can directly view the source code ;
Dynamic scripts interact with databases , Is running on the web Server , The execution result is displayed ( You can also run in the browser , Source code can be seen )
Reference material :
official account 0x00 laboratory , Interested friends suggest reading tweets
边栏推荐
- 华泰证券网上开户安全吗?
- [.net6] use ml.net+onnx pre training model to liven the classic "Huaqiang buys melons" in station B
- Recommend a JSON visualization tool artifact!
- What are the advantages and disadvantages of PHP
- 内存泄漏定位工具之 valgrind 使用
- Project0:小游戏
- 《百年巨匠》数字藏品中奖名单公布
- Error: missing revert data in call exception
- Get key code
- Guys, how to export iceberg data to MySQL? What tools are there? Neither sqoop nor dataX
猜你喜欢

The list of winners of the digital collection of "century master" was announced

Applymiddleware principle

Uncover the secrets of new products! Yadi Guanneng 3 multi product matrix to meet the travel needs of global users

技术分享 | Linkis参数介绍

Suggest collecting | what to do when encountering slow SQL on opengauss?

Combination of Oracle and JSON

Wireshark TS | confusion between fast retransmission and out of sequence

The exclusive collection of China lunar exploration project is limited to sale!

NeurIPS 2022 | 细胞图像分割竞赛正式启动!

mysql如何把 一个数据库中的表数据 复制到 另一个数据库中(两个数据库不在同一个数据库链接下)
随机推荐
Suggest collecting | what to do when encountering slow SQL on opengauss?
CVPR 2022 | Virtual Correspondence: Humans as a Cue for Extreme-View Geometry
Global filter (processing time format)
flutter path_provider: ^2.0.10可以获取临时目录
12 product management platforms that everyone is using
YoDA统一数据应用——融合计算在蚂蚁风险场景下的探索与实践
Submission lottery - light application server essay solicitation activity (may) award announcement
MIT's latest paper, "the need for interpretable features: motivation and classification": building interpretability in the constituent elements of machine learning models
内存泄漏定位工具之 valgrind 使用
放弃深圳高薪工作回老家
Combination of Oracle and JSON
Infinite innovation in cloud "vision" | the 2022 Alibaba cloud live summit was officially launched
使用强大的DBPack处理分布式事务(PHP使用教程)
《百年巨匠》数字藏品中奖名单公布
获取键代码
银行卡借给别人是否构成犯罪
关于Keil编译程序出现“File has been changed outside the editor,reload?”的解决方法
flutter path_ Provider: ^2.0.10 can get temporary directory
applyMiddleware 原理
LeetCode 438. 找到字符串中所有字母异位词__滑动窗口