当前位置:网站首页>Project training of Software College of Shandong University - Innovation Training - network attack and defense shooting range experimental platform of Software College of Shandong University (XXV) - p
Project training of Software College of Shandong University - Innovation Training - network attack and defense shooting range experimental platform of Software College of Shandong University (XXV) - p
2022-06-12 17:33:00 【A stranger_】
Personal summary of the project
Contact the instructor from the winter vacation , Choose a topic , To this day (6.10 Number ), It took four months , Our team through very good cooperation , Completed the project . After the preliminary planning and analysis of the project in March , Start the opening defense , After passing the oral defense, the overall system architecture will be reviewed 、 The main technical points involved will be discussed and studied in detail , Then the division of labor within the group , Research through continuous discussion within the group , And with the help of the instructor , We finally overcame one technical difficulty after another , Finally, the goal beyond the plan was achieved , When the system starts to reply , Make a plan to achieve 10 A loophole , Our last system , Realized 12 A loophole , total 28 A shooting range , It's also achieved 12 A tool ,7 Code audit , as well as WriteUp、 The teacher side has the functions of course experiment management .
The Cyberspace Security Vulnerability shooting range used in this project training Java As the main development language , It uses the most common in the current engineering environment Springboot + vue + mybaits The front and rear ends of the separation frame . And integrated NodeJS Services and elementUI etc. css Style development front-end interface . On the server deployment , Used docker Packaging . The server uses Tencent cloud 2 nucleus 4G、6M Broadband ,CentOS 7.6 operating system , Database used MySQL 5.6,JDK Use 1.8 edition ,Docker It uses Community 20.10.17.
Because each target aircraft in the project is a web interface with loopholes , Therefore, it is necessary to take precautions consciously , Otherwise, the attacker can exploit these vulnerable environments to attack our host server , Make the system crash . To avoid this happening , As a result of the discussion , We proposed be based on Docker Dynamic deployment range The plan , Every user is doing experiments , Experiment topic for this user , Dynamically create a target container , Submit in user flag in the future , You can choose whether to destroy the range , But a user can only create one container at a time , Therefore, if the user does not destroy the container of this topic , Then he will not be able to create a new container environment for other topics . In order to prevent criminals from using the loopholes reproduced on the platform as a springboard to attack the server . The security of the whole system is guaranteed .
In this project , I am mainly responsible for the development of some vulnerability target aircraft , contain :RCE Loophole 、SQL Inject holes ( Include parentheses SQL Inject 、 Unsafe filtering SQL Inject 、 Not circularly filtered SQL Inject )、 Upload files 、 File download vulnerability 、xxe Loophole 、java Deserialization vulnerability 、 Redirection vulnerability 、 Logic is beyond authority . as well as writeup Module development , Development of some tools , contain :CMS Fingerprint identification tools 、 Subdomain query tool 、ip Query tools 、 Port scan tool .Docker Dynamic creation and destruction of containers , Overall project deployment, etc . The total number of code lines reached 10000 Row or so .
Through this project training , Gain a lot . First of all The improvement of learning ability . In the original development project , I can hardly read official documents , The basic problem is to search for solutions on the Internet . After this project training , Learned to view some official documents , At the same time, I realized the efficiency of viewing official documents to solve problems . The second is The improvement of communication ability . This project training , Our team consists of five members , There may be some communication between every two people . And I deploy as a project 、 The principal responsible for the dynamic creation and destruction of containers , There may be a lot of communication with each member . Recognize the importance of communication in team development . And finally Technical improvements . After this project training , Learned to VUE、SpringBoot、MyBaits、Docker And other mainstream frameworks and technologies . Learned most common basic vulnerability principles , for example :XSS Loophole 、XXE Loophole 、RCE Loophole 、 Arbitrary file upload vulnerability 、 Arbitrary file download vulnerability 、 Logic is beyond authority 、URL Redirection vulnerability 、Java Deserialization vulnerability 、SQL Injection holes, etc , And it can build a target environment with various vulnerabilities by itself . Learned the principles of relevant Cyberspace Security tools , for example :CMS fingerprint identification 、IP Inquire about 、 Port scanning 、 Subdomain name query, etc , And can independently complete the implementation of the tool . Through this project training, we have a deeper understanding of the relevant knowledge in the field of Cyberspace Security .
Finally, this project has great practical significance , As a complete project , The network security range system can be used as an experimental platform for the relevant professional courses of the Cyberspace Security experiment class , And our team has worked with the responsible Professor “ System security ”、“ Network attack and prevention ” Mr. Lin of the two courses had a discussion and exchange , Mr. Lin agrees with our project very much , And it promises to be a platform for experiment and practice of system security , Among them, the completion of students can be included in the final examination as their usual grades .
With the end of the project defense , The main development work of the project has been completed , The system will be further maintained according to the needs of teachers .
边栏推荐
- R语言使用epiDisplay包的tabpct函数生成二维列联表并使用马赛克图可视化列联表(二维列联表、边际频数、以及按行、按列的比例)、自定义设置ylab参数设置Y轴的轴标签文本(y axis)
- Understanding of binary search
- The R language uses the aggregate The plot function visualizes the summary statistical information of each subset (visualization is based on the probability value and its 95% confidence interval of th
- Compilation optimization of performance optimization
- 消息队列实战之队列优先级
- ShardingJDBC 分库分表详解
- 写技术博客的意义
- Detailed explanation of shardingjdbc database and table
- Record the use of yolov5 to detect rotating targets
- Arm64棧回溯
猜你喜欢

How to view, modify, and delete SSH

TensorFlow求梯度时提示TypeError: unsupported operand type(s) for *: ‘float‘ and ‘NoneType‘

Gerrit+2 triggers Jenkins task

Use GCC's PGO (profile guided optimization) to optimize the entire system

Microsoft Office MSDT Code Execution Vulnerability (cve-2022-30190) vulnerability recurrence

Atlassian Confluence 远程代码执行漏洞(CVE-2022-26134)漏洞复现

1.5 什么是架构师(连载)

office应用程序无法正常启动0xc0000142

布局管理中的sizePolicy的策略问题

Cicada mother talks to rainbow couple: 1.3 billion goods a year, from e-commerce beginners to super goods anchor
随机推荐
Li Kou today's question 926 Flip string to monotonic increment
DRM 驱动 mmap 详解:(一)预备知识
Introduction of one object one code tracing system
Evolution and thinking of Taobao native R & D mode | DX R & D mode
龙芯处理器内核中断讲解
淘宝Native研发模式的演进与思考 | DX研发模式
内核中断整体流程图
1723. minimum time to complete all work
Deep interest evolution network for click through rate prediction
Add static route
Use GCC's PGO (profile guided optimization) to optimize the entire system
R语言使用pdf函数将可视化图像结果保存到pdf文件中、使用pdf函数打开图像设备、使用dev.off函数关闭图像设备、自定义width参数和height参数指定图像的宽度和高度
分辨率与行场同步信号的关系 场消隐
Tensorflow reads data from the network
Cesium抛物线方程
office应用程序无法正常启动0xc0000142
快速入门scrapy爬虫框架
Compilation optimization of performance optimization
String的split方法的使用
Figma from getting started to giving up