当前位置:网站首页>Web security summary
Web security summary
2022-07-03 11:36:00 【Jiangnan has no old friends】
Web Safety final summary
SQL Inject
principle :
utilize Web Security loopholes in the processing of background database query statements , The attacker submits a carefully constructed database query code , Based on the returned results , Get the data he wants to know
Affected systems : A system that does not check and filter input parameters
common SQL Injection process :
1. Modify parameter values and other data , The modified data is injected into SQL In the sentence
2. The database engine executes the modified SQL command , Return the result
3. Construct statements based on the returned sensitive information for further injection
example :
Cross-site scripting attacks (XSS)
principle :
Web The server did not validate the user input , And easily return to the client
The attacker went to Web Malicious insert in the page html Code , When a user views the web page , The malicious code embedded in it is executed
harm :
You can steal user accounts , Modify user settings , Stealing / Pollution cookie, Make false advertisement , Check the host information
Attack steps :
1. Looking for loopholes
2. Inject malicious code
3. Trick users into accessing
Cross-site request forgery (CSRF)
principle :
The target site A, Malicious websites B
The file contains a vulnerability
When using this 4 When a function contains a new file , This document will serve as php Code execution ,php The kernel doesn't care about the type of file that should be included
Verification code technology
It is used to distinguish between man and machine , It's defense http A means of attack
summary
Threats to clients and servers :
defense Web attack :
The server :
1. simplicity , It's best to remove unnecessary services
2. Use super users with caution
3. Local and remote access control
4. Audit , Look for suspicious data in the audit records
5. Backup policy , It is convenient to quickly restore services to reduce losses
client :
1. Set the security of the browser , Use browsers with fewer vulnerabilities , Upgrade the browser frequently
2. Often patch the operating system 、 upgrade
3. Try not to open some untrusted websites
The same-origin policy :
边栏推荐
- LeetCode 46:全排列
- How to get started embedded future development direction of embedded
- Programmers' entrepreneurial trap: taking private jobs
- Based on MCU, how to realize OTA differential upgrade with zero code and no development?
- 高精度室内定位技术,在智慧工厂安全管理的应用
- Kibana~Kibana的安装和配置
- Some common terms
- 面試題總結(2) IO模型,集合,NIO 原理,緩存穿透,擊穿雪崩
- 金额计算用 BigDecimal 就万无一失了?看看这五个坑吧~~
- Arctangent entropy: the latest SCI paper in July 2022
猜你喜欢
Application of high-precision indoor positioning technology in safety management of smart factory
After using the thread pool for so long, do you really know how to reasonably configure the number of threads?
Matlab extracts numerical data from irregular txt files (simple and practical)
Software testing weekly (issue 78): the more confident you are about the future, the more patient you are about the present.
Excel表格转到Word中,表格不超边缘纸张范围
Gut | Yu Jun group of the Chinese University of Hong Kong revealed that smoking changes intestinal flora and promotes colorectal cancer (do not smoke)
The excel table is transferred to word, and the table does not exceed the edge paper range
机器学习 3.2 决策树模型 学习笔记(待补)
PHP server interacts with redis with a large number of close_ Wait analysis
Spl06-007 air pressure sensor (example of barometer)
随机推荐
Based on MCU, how to realize OTA differential upgrade with zero code and no development?
Use typora to draw flow chart, sequence diagram, sequence diagram, Gantt chart, etc. for detailed explanation
Illustrated network: what is virtual router redundancy protocol VRRP?
How to get started embedded future development direction of embedded
Arctangent entropy: the latest SCI paper in July 2022
CSRF
How to become a senior digital IC Design Engineer (1-4) Verilog coding syntax: expression
Oracle withdraw permission & create role
LeetCode 46:全排列
This article explains the complex relationship between MCU, arm, MCU, DSP, FPGA and embedded system
Solve undefined reference to`__ aeabi_ Uidivmod 'and undefined reference to`__ aeabi_ Uidiv 'error
repo ~ 常用命令
DS90UB949
uniapp scroll view 解决高度自适应、弹框滚动穿透等问题。
多维度监控:智能监控的数据基础
After using the thread pool for so long, do you really know how to reasonably configure the number of threads?
面試題總結(2) IO模型,集合,NIO 原理,緩存穿透,擊穿雪崩
AMS series - application startup process
How to clean up v$rman_ backup_ job_ Details view reports error ora-02030
[vtk] source code interpretation of vtkpolydatatoimagestencil