当前位置:网站首页>(4) Web security | penetration testing | network security web site source code and related analysis
(4) Web security | penetration testing | network security web site source code and related analysis
2022-07-06 07:07:00 【Black zone (rise)】
as everyone knows :
web Source code is a very important source of information in security testing , It can be used for code audit vulnerabilities and information breakthrough , among WEB There are many technologies in the source code that need concise analysis .
eg: obtain ASP The source code can be downloaded from the default database , To obtain the source code vulnerability of some other script, you can conduct code audit, mine or analyze its business logic, etc , Therefore, the acquisition of source code will provide more ideas for later security testing

Web Source directory structure
Database configuration file , Background Directory , The template directory , Database directory, etc
admin---------------------------------- Website background Directory
data------------------------------------ Database related directories
install---------------------------------- The installation directory
member------------------------------- Membership directory
template------------------------------ The template directory ( Build an overall architecture related to the website )
data(confing.php)-------------- Database configuration file , Communication information of website and database , Connection account password , You can connect to each other's database , From the database to get the source code of this website, which involves the administrator's account and password .
You can see how to open a source code of Baidu online , Some small ones may only have some directories
Web Source script type
ASP,PHP,ASPX,JSP,JAVAWEB And other script type source code security issues
Check the type of website through the file directory

About Web Source application classification
Portal site --------------------------- comprehensive
Online retailers --------------------------------- Business logic
Forum ---------------------------------XSS
Blog --------------------------------- Less
The third party ------------------------------ Look at its function
Access to source code : Search for , Free fish Taobao , Third party source station , Corresponding to various industries .
Open source : You can search the vulnerability related articles on the Internet .
Inside : Routine penetration tests , Use scanning tools to judge .
If you can't get the source code, you can find the same type of source code analysis
Identify the cms, Here's a asp Script written website

The bottom display technical support is GOOMAY company-developed ,

Then I want to find out if he is using cms Developed , Developed by ourselves
Add /robots.txt See if you can see

The result is the login page

Now I'm going to try this one that provides technical support , It is developed by ourselves , still cms Developed
① If we analyze the used cms edition , You can find the vulnerability of the corresponding version of Baidu online
② If the website has been patched , Then consider scanning tools and related source code for analysis
③ If they developed it bit by bit , No source code , It's time to scan bit by bit
边栏推荐
- What is the biggest problem that fresh e-commerce is difficult to do now
- TS Basics
- UWA Pipeline 2.2.1 版本更新说明
- Missing monitoring: ZABBIX monitors the status of Eureka instance
- 呆错图床系统源码图片CDN加速与破解防盗链功能
- A method to measure the similarity of time series: from Euclidean distance to DTW and its variants
- LeetCode 78:子集
- Internal and external troubles of "boring ape" bayc
- 树莓派串口登录与SSH登录方法
- 开源的网易云音乐API项目都是怎么实现的?
猜你喜欢

Idea console color log

Upgraded wechat tool applet source code for mobile phone detection - supports a variety of main traffic modes

呆错图床系统源码图片CDN加速与破解防盗链功能

leetcode1020. 飞地的数量(中等)
![[daily question] 729 My schedule I](/img/6b/a9fef338ac09caafe628023f066e1f.png)
[daily question] 729 My schedule I

Oracle database 11gr2 uses TDE transparent data encryption to report an error ora28353. If you run to close the wallet, you will report an error ora28365. If you run to open the wallet, you will repor

First knowledge of OpenGL es learning (1)

Missing monitoring: ZABBIX monitors the status of Eureka instance

C语言_双创建、前插,尾插,遍历,删除

【每日一题】729. 我的日程安排表 I
随机推荐
19.段页结合的实际内存管理
The ECU of 21 Audi q5l 45tfsi brushes is upgraded to master special adjustment, and the horsepower is safely and stably increased to 305 horsepower
Simple use of MySQL database: add, delete, modify and query
Do you really know the use of idea?
简单描述 MySQL 中,索引,主键,唯一索引,联合索引 的区别,对数据库的性能有什么影响(从读写两方面)
Yield method of tread
leetcode841. Keys and rooms (medium)
LeetCode 78:子集
中青看点阅读新闻
树莓派串口登录与SSH登录方法
MPLS experiment
NFT on fingertips | evaluate ambire on G2, and have the opportunity to obtain limited edition collections
Depth residual network
GET 和 POST 请求类型的区别
开源的网易云音乐API项目都是怎么实现的?
UNIPRO Gantt chart "first experience": multi scene exploration behind attention to details
L'auteur est mort? Ai utilise l'art pour conquérir l'humanité
Misc of BUU (update from time to time)
Kubernetes cluster builds ZABBIX monitoring platform
3. Business and load balancing of high architecture