当前位置:网站首页>About information disclosure and defense
About information disclosure and defense
2022-06-23 05:25:00 【Johnny, me】
Information disclosure
- Strictly speaking, information disclosure is not a security vulnerability , It is the general name of a kind of phenomenon
- Whether it's web Both developers and users should pay attention to information disclosure
- Specific information breaches include
- Disclose sensitive information of the system ( Server configuration , Password etc. )
- Divulge user sensitive information ( The user registers at a station , Information is sold or stolen )
- Divulging user passwords ( Obvious security vulnerabilities )
- Ways of information disclosure
- Error message out of control ( Error messages are exposed because they are not handled well )
- SQL Inject ( The website exposes a lot of database information under unexpected circumstances )
- Improper horizontal authority control ( What users can see , Whether users with the same rights have overstepped their authority )
- XSS/CSRF( Direct disclosure of information )
- …
- Information leakage will lead to the rise of social engineering
social engineering
- Social engineering is a rigorous science
- But in the increasingly complex security environment, social engineering tends to social engineering fraud
- for instance , It will dig out your information through some channels
- nickname
- real name
- mailbox
- cell-phone number
- ID number
- password
- …
- This information , More and more can be done after a variety of combinations and information mining
- For example, get your Alipay password through the above information , Because it may need a cell phone number , ID number and mobile phone number
- When there is more and more information , The image of this person can be established in a three-dimensional way
- At this time, the secret protection is invalid , You can pretend to be yourself
- This is a very terrible thing
- Your identity is determined by the information you have
- Others have your information , Can pretend to be your identity
- Then you can use your identity to do bad things
- So information leakage can cause serious consequences
- web Development must try its best to ensure that the user's data is not leaked
Common cases of information leakage
- telecommunication fraud
- Camouflage public security law
- QQ Video borrowing
- Wechat disguises friends
OAuth thought
- These hazards and cases startle us
- We can learn from some mature schemes in the industry :OAuth
- OAuth Participants involving three parties
- QQ: Master the user information, password and other information
- Broken website : There are safety risks
- user
- OAuth Under the authorization of the user , from QQ Where to get information
- This can be very good defense QQ Data leakage
- The specific process is as follows
- The user requests a third party to log in on the broken website
- The broken website redirects to QQ
- The user is in QQ Enter the password on the website to confirm the right to log in
- After successful login , from QQ The website jumps back to the broken website
- Broken websites will request accessToken( User credentials )
- QQ return accessToken
- Broken website through accessToken towards QQ Get user information
- Among them the accessToken You can only obtain the user data when the user is authorized and cannot obtain other user information
- The key idea is
- All actions are authorized by the user
- Authorization does not disclose sensitive information
- Authorization will expire
- We can also use this idea to prevent the leakage of user information when developing our website
utilize OAuth Protect user data
- There are also three party objects
- Sensitive information : Identity information, etc
- Business : Publish articles and other functions
- user
- After this split , Our website will be like this
- The user logs in to the sensitive data party through the account and password
- Login successful , Sensitive information is distributed to users token
- At this time, the user brings the ticket token Request business
- User data is involved in business processing , For example, send email notification, etc
- The bill brought by the user is used for business operation
- Exchange sensitive data for user information through bills
- Business continues
- The characteristics of this process
- The user is authorized to read the data
- Unauthorized data cannot be read
- Batch data acquisition is not allowed
- The data interface can be used for risk control audit
- Do you know whose business it is
- What did you check
- When did you query it
- Through this process, users can effectively prevent unlimited leakage
- At this time, the data of a single user may be leaked
- Through the audit process, the problem of batch data leakage is effectively prevented
- The architecture will be a little complicated , Mainly to build sensitive data objects
- We can change the sensitive information into another nice name : User center
- If such a user center layer is built , You can avoid sql Attacks brought by injection
- because sql Not in the business , Just call the interface to the user center to retrieve user data , No, sql Unable to inject
- Even if it is injected from other businesses , The information is no longer here , Unable to obtain user sensitive data
- If some dishonest employees in the enterprise want to sell user data , You can't query user data without a ticket
- Sensitive information ( User center ) Only oneortwo employees to maintain , Do not allow a wide range of employees to access , Relatively safer
边栏推荐
- onnxoptimizer、onnxsim使用记录
- Post processing of multisensor data fusion using Px4 ECL
- pkav简单爆破
- MCS:离散随机变量——Bernoulli分布
- Master shell, one article is enough!
- MCS: continuous random variable chi square distribution
- MCS: discrete random variable - uniform distribution
- 同步国内AOSP代码相关错误
- 应用挂了~
- Open source ecology 𞓜 super practical open source license basic knowledge literacy post (Part 2)
猜你喜欢

UnityShader入门精要——Unity中的渲染优化技术(四)

【opencv450】 图像相减、二值化、阈值分割

AMS:startActivity桌面启动应用

H5 adaptive full screen

The propeller framework v2.3 releases the highly reusable operator library Phi! Restructure development paradigm to reduce cost and increase efficiency

面对新的挑战,成为更好的自己--进击的技术er
![[microservices | Nacos] Nacos realizes data isolation of multi environment and multi tenant](/img/dc/f00a780e96032c0b7d9b6d7c2267d1.png)
[microservices | Nacos] Nacos realizes data isolation of multi environment and multi tenant

JDBC入门学习(二)之封装工具类

What do Niu B programmers pay attention to when "creating an index"?

Jenkins安装部署以及自动构建和发布jar应用
随机推荐
小时候 觉得爸爸就是天 无所不能~
关于DOS/DDOS攻击和防御
Introduction to MySQL (II) sub query + Association
[microservices | Nacos] list of issues related to the Nacos version
OSPF shunt test
The propeller framework v2.3 releases the highly reusable operator library Phi! Restructure development paradigm to reduce cost and increase efficiency
小时候 觉得爸爸就是天 无所不能~
MCS: continuous random variable lognormal distribution
Calculate Euclidean distance and cosine similarity
LeetCode 797:所有可能的路径
Three implementation methods: left fixed and right adaptive (Flex, float + BFC, float margin left)
STP summary
MCS:连续随机变量——Chi-Square分布
Image noise reduction denoise AI
Fund performance evaluation
hash---------history
Web application security testing guide
Drama asking Huamen restaurant Weng
shutdown关机命令
insert into... Where not exists insert to avoid repeated use