当前位置:网站首页>Web security - payload
Web security - payload
2022-07-06 20:14:00 【the zl】
Payload —Payload
summary : stay Web Safe learning process , It's usually mentioned that Payload The word , But what does this mean in security .
brief introduction :
Payload It can be directly translated into " Payload ", Its meaning can be understood as " Valid data ".
Payload Understand and summarize :
Analysis from the perspective of agreement : A complete data transmission process usually consists of three parts , Data headers + Raw data ( Data frame or packet + Check tail ), The data header and check tail are for the accurate transmission of original data , Then the original data is what we usually say Payload.
IPV4 Example of protocol packet structure :
BurpSuite in Payload give an example :
DVWA In the shooting range Brute Force modular , stay BurpSuite Pick up the agent , Send to the attack module
BurpSuite Marked in is HTTP The original data transmitted by the Protocol , That's what they say Payload, We can use dictionaries to construct Payload Data to achieve violent cracking attacks
summary :
1,Payload Is the valid data in the transmission packet
2,Payload Usually modifiable , It can be used for vulnerability exploitation and detection
边栏推荐
猜你喜欢
语音识别(ASR)论文优选:全球最大的中英混合开源数据TALCS: An Open-Source Mandarin-English Code-Switching Corpus and a Speech
rt-thread i2c 使用教程
Discussion on beegfs high availability mode
22-07-05 upload of qiniu cloud storage pictures and user avatars
新一代垃圾回收器—ZGC
【计网】第三章 数据链路层(3)信道划分介质访问控制
[network planning] Chapter 3 data link layer (4) LAN, Ethernet, WLAN, VLAN
Monthly report of speech synthesis (TTS) and speech recognition (ASR) papers in June 2022
(3) Web security | penetration testing | basic knowledge of network security construction, IIS website construction, EXE backdoor generation tool quasar, basic use of
HMS Core 机器学习服务打造同传翻译新“声”态,AI让国际交流更顺畅
随机推荐
Poj3617 best cow line
redisson bug分析
Example of shutter text component
Anaconda安裝後Jupyter launch 沒反應&網頁打開運行沒執行
Tencent T3 Daniel will teach you hand-in-hand, the internal information of the factory
Standardized QCI characteristics
8086指令码汇总表(表格)
Monthly report of speech synthesis (TTS) and speech recognition (ASR) papers in June 2022
Transformer model (pytorch code explanation)
(3) Web security | penetration testing | basic knowledge of network security construction, IIS website construction, EXE backdoor generation tool quasar, basic use of
Classic 100 questions of algorithm interview, the latest career planning of Android programmers
Technology sharing | packet capturing analysis TCP protocol
JVM_ Common [interview questions]
POJ1149 PIGS 【最大流量】
Configuration and simple usage of the EXE backdoor generation tool quasar
棋盘左上角到右下角方案数(2)
案例 ①|主机安全建设:3个层级,11大能力的最佳实践
【GET-4】
Catch ball game 1
Color is converted to tristimulus value (r/g/b) (dry stock)