当前位置:网站首页>Website vulnerability repair service provider's analysis of unauthorized vulnerability
Website vulnerability repair service provider's analysis of unauthorized vulnerability
2022-07-31 15:49:00 【51CTO】
There are unauthorized loopholes in the website. First of all, let's talk about what are the key controllable parameters, that is to say, like some of our key parameters, for example, use ID order by ID are some key parameters, which must be controlled by a tester like you.If this parameter has been hijacked, or he has a fixed value.At this time, it is not called a controllable parameter.The key is that your changes must be able to cause this overriding effect called a key parameter.We must quickly locate this key and controllable parameter, so that we can find the corresponding unauthorized vulnerability more quickly.
What does the principle of adhering to the same change and control of parameters mentioned later mean, because we may have multiple in a request messagevariables, or in this case of multiple parameters.Then we generally consider changing one parameter first, and the other parameters do not change.Let's take a look at the changes in this response information.Then if the situation you want does not appear, you can consider changing another variable, that is, changing two variables, and then until all variables are changed, or some variables are deleted, which is called our sameChange the same control principle.
Here we can see that other variables are kept unchanged, and key variables are changed or changed at the same time. After listening to me, you may think that these are conceptsSex, you may feel very confused, so let's take a look at an example to explain.Before looking at the example, I almost forgot to mention how we find this key variable, but let's take a look at such a parameter.First of all, I classify it as the ID of the user's identity, a unique identifier given to the user by the main network in it, through which the user's identity can be determined, such as your mobile phone number, ID number, or yourThe ID number and user ID are all unique, because if you think about a website, the user name you registered will definitely not be repeated, because it is written into the database, it will definitely educate you whether this user exists or not,If there is, you don't need to continue to register, so the user ID is also their only such a parameter that identifies his identity. This is used to identify the user identity of our user in the website.called user identity.
The second one is called the user attribute ID, which is the attribute ID generated by the user when using the website, for exampleWhen he places an order, will he have this order number, or if it can modify some of its data when it opens the personal center, there may be changes in the value of some parameters.Also what address ID.Record number ID.These can be understood as such an ID matured by his identity, or its attributes, such as whether our human attributes can think, run, sing, and swim.It is this attribute of our people, and the user attribute ID here is the attribute aid that is generated according to a certain type of operation we are performing.
Let's see, horizontal override is based on identity ID, etc.Seeing this example, we can see that here, we see this key parameter, it is the get method, the get method we will target or focus on its URL, because we all know the parametersThe value is placed on this URL, and our post method is placed in the request body, which must be distinguished.We see that there are only two parameters here. How do we determine which is the key parameter? We can use one of its semantics. Most programmers follow the concept of semantics when writing code, becauseMany programmers only think about how to implement functions and ignore security vulnerabilities when writing code. Therefore, it is recommended that if there are vulnerabilities such as unauthorized access to the website, the website vulnerability repair service provider SINE Security can check it.
边栏推荐
猜你喜欢

全新宝马3系上市,安全、舒适一个不落

Ubantu project 4: xshell, XFTP connected the virtual machine and set xshell copy and paste the shortcut

Premiere Pro 2022 for (pr 2022)v22.5.0

WeChat chat record search in a red envelope

Kubernetes common commands

Grafana安装后web打开报错

基于Redis(SETNX)实现分布式锁,案例:解决高并发下的订单超卖,秒杀

The new BMW 3 Series is on the market, with safety and comfort

为什么黑客领域几乎一片男生?

leetcode303 Weekly Match Replay
随机推荐
删除 状态良好(恢复分区)的磁盘
实现防抖与节流函数
Synchronized and volatile interview brief summary
leetcode303 Weekly Match Replay
在资源管理类中提供对原始资源的访问——条款15
[MySQL] Mysql paradigm and the role of foreign keys
6-22 Vulnerability exploit - postgresql database password cracking
Applicable Scenarios of Multi-Master Replication (1) - Multi-IDC
What is the difference between BI software in the domestic market?
Visualize GraphQL schemas with GraphiQL
tooltips使用教程(鼠标悬停时显示提示)
浏览器自带的拾色器
使用 GraphiQL 可视化 GraphQL 架构
T - sne + data visualization parts of the network parameters
字符串反转的实现方法总结「建议收藏」
tensorflow2.0 cnn(layerwise)
Public Key Retrieval is not allowed error solution when DBeaver connects to MySQL 8.x
update data table update
Replication Latency Case (3) - Monotonic Read
The new BMW 3 Series is on the market, with safety and comfort