当前位置:网站首页>Why are there loopholes in the website to be repaired
Why are there loopholes in the website to be repaired
2022-07-24 19:05:00 【websinesafe】
Why do many website systems have this security vulnerability , Some of the websites I refer to here are those of small companies , Or some personal website system , For example, like Ali 、 tencent 、 Baidu, these big companies , They have their own development team and related security personnel , Their vulnerabilities are relatively very, very few . So a website , Once this security vulnerability exists , It may cause huge economic losses . Generally, if there is a website with this security vulnerability , It will cause this data to be maliciously modified , Or some sensitive data is stolen , Thus causing economic losses .

Next, I will explain it to you through a case , If you have seen this case , You can skip , Enter the following detailed description . Here I have prepared a website for you , So this website , You can also use Baidu , Then search for keywords , You can find its official website . Then the official website , When we test this security vulnerability in advance , It is found that there is a high-risk injection vulnerability . Of course, if this loophole , We will also inform their relevant technical personnel , Technical maintenance personnel , Then help them fix this vulnerability , This website is also licensed before vulnerability testing , Never test vulnerabilities without authorization .
So today, I'll show you how to use this vulnerability . Because it has this security vulnerability , Then the data of the website above will be maliciously modified , For example, some lawless elements , He can modify the customer service contact number , Of course, some pictures and data above can be modified , For example, the official QR code , Then I'll show you how to use this vulnerability .

First of all, we need to use a tool , So this tool is specially used to scan vulnerabilities , Then let's test this website first , Change the number of customer service into 400120-120, In this case, we need to use an attack script , Then let's copy , Then open this tool , Then we will fill in the injection script , Then it has a backstage address , We just fill in the address of its website , Then let's click on the injection script , Then let's refresh , And let's see , The words in this become this 400120120, Then next, let's try to modify its QR code , Because it is a two-dimensional code, it is in the form of a picture , So we have to prepare a QR code in advance , QR code picture , For example, we have prepared this QR code in advance , This is a replaced QR code , Then let's execute the attack script , Then take a look at this specific effect , Let's copy this code , Then, in the same words, click the injection script in the injection script , Then let's refresh and have a look . Let's see , The QR code of the location has been modified .
The demonstration of this vulnerability can be seen through the above case , Because the website has this security vulnerability , It will cause some information to be modified . For example, some contact information , There are also some QR codes or pictures, etc . If you are doing this advertising , Because this promotion page has this security vulnerability , It will cause you to spend money on advertising for others .
So back to this topic , So why do many websites have this security vulnerability , First of all, because the vast majority of such small companies or individuals have such website systems , Usually, it is not developed by ourselves , They are purchased through some online channels , For example, Taobao or some personal technology developers , And bought it from there .
So these technology developers or some Taobao stores , Do they have a very strong technical foundation , Of course not. , They also download the relevant source code on the Internet , Then build it for you , So many prices are very low , For example, there are tens of dollars, hundreds of dollars and thousands of dollars , Like some CMS System , The blog system , Then the enterprise website system and so on .
good , But these source codes downloaded from the Internet , Has he been hacked into some backdoors in advance , Or whether the source code has this code defect , In this case, others won't care about this problem at all , What others care about is to build a good system for you , Then the acceptance is passed , You pay and you're done .

Usually, the correct way is to conduct this security audit on these systems , Carry out this safety audit and check , See if it has this security vulnerability . For another, you need to do some safety tests , Even if the code has this defect . The second reason is mainly because there are many such systems now , It uses a wide variety of open source components , Then usually a mature system , It will contain numbers 10 This kind of component , Do these components have this security risk .
If once others have studied this loophole , And you have to use this set of source code , Then it will be easily broken by others , For example, the previous dream weaving dedeCMS, It will have upload vulnerabilities , Lead to domestic 60% Our website systems have been taken down by hackers , Then do Baidu gray keywords and so on . Of course, there are many reasons for the security vulnerability of this anti station , Because of this time , I will not give examples one by one , If there is anything you don't understand , Or it needs the technical support of this related website vulnerability repair , Can come to find SINE Seek relevant technical support for safety
边栏推荐
- OPENGL学习(四)GLUT三维图像绘制
- Principle and application of database
- vim相关介绍
- Convolutional Neural Networks in TensorFlow quizs on Coursera
- MySQL version 5.7.9 SQL_ mode=only_ full_ group_ By question
- 理解动态计算图,requires_grad、zero_grad
- Oneinstack installation and configuration PHP 8.1 and MySQL 8.0-oneinstack site building novice tutorial
- 2020-2021 new technology lecture course
- First knowledge database
- [question 39] special question for Niuke in-depth learning
猜你喜欢

Sequences, time series and prediction in tessorflow quizs on coursera (I)

matplotlib

Eternal Blue ms17-010exp reappears

LTSpice software power settings

永恒之蓝MS17-010exp复现

Vsftpd2.3.4 port penetration 6200 IRC_ 3281_ backdoor

Implement a proxy pool from 0

Understand dynamic calculation diagram, requires_ grad、zero_ grad

ETL development tool kettle download installation environment construction and use tutorial

The difference between static method and instance method
随机推荐
OPENGL学习(二)OPENGL渲染管线
The problem that files cannot be uploaded to the server using TFTP is solved
Excel practice notes 1
Thread lifecycle and basic methods
Get module handle / base address
Mysqlworkbench performance analysis tool -- Performance dashboard
Free and open source website navigation source code collection, sorting and summary - self built personal navigation Homepage
全国职业院校技能大赛网络安全竞赛之数据分析数字取证-A
Convolutional Neural Networks in TensorFlow quizs on Coursera
Principle and application of database
MySQL sort. Sort by field value
Network security port 80 - PHP CGI parameter injection Execution Vulnerability
多线程与并发编程常见问题(未完待续)
redis 数据类型
Add column by column selection for JTable
The difference between static method and instance method
asp. Net core, C # summary about path
What are the benefits of knowledge management in enterprises?
Process pool and fallback function [easy to understand]
Nacos introduction and console service installation