当前位置:网站首页>(3) Web security | penetration testing | basic knowledge of network security construction, IIS website construction, EXE backdoor generation tool quasar, basic use of
(3) Web security | penetration testing | basic knowledge of network security construction, IIS website construction, EXE backdoor generation tool quasar, basic use of
2022-07-06 19:42:00 【Black zone (rise)】
First, learn to use IIS Build a website
Common build platform scripts are enabled
ASP,PHP,ASPX,JSP,PY,JAVAWEB Such as the environment
domain name IP Directory resolution security issues
① adopt IP Address access can find more information , Sometimes you can find program source code backup files and sensitive information
② Domain name access can only find all files in one folder ,ip Access is the upper level of domain name access .
③ Support when building the website IP Access and domain name access , Domain name access points to a directory ,IP Access points to the root directory .
Common file suffix resolution corresponds to security
Specifies that the suffix corresponds to a file , If you encounter a file that cannot be parsed when accessing the website, the middleware may default or add some settings, resulting in problems in parsing .
Set print processing specific program requests
Safety protection in common safety tests
Internal websites of schools and enterprises , Will restrict external access to internal websites , Limit IP Address , Regulate the permissions of visitors . Authentication and access control , User based restrictions , Limit IP Address access , Authorized access - Only specified IP The address can be accessed . Access denied - Appoint IP Address denied access .
WEB Back door and user and file permissions
exe Back door generation tool Quasar
link :https://pan.baidu.com/s/15XpECQY8SKJwIBxsTy_F3Q
Extraction code :hj12
Usage method :
Folder settings related permissions , Disable guest user permissions , Cause the connected back door to see nothing , It's a protective skill , It is also a common problem in security testing
Brief identification based on middleware
The data packet returned by fetching , Query the platform information
service:nginx/1.8.0
web Summary of common middleware vulnerabilities
link :https://pan.baidu.com/s/1NKejdCI_UY8syRIDfVZwEg
Extraction code :hj12
边栏推荐
- 通俗的讲解,带你入门协程
- 力扣101题:对称二叉树
- C # - realize serialization with Marshall class
- 接雨水问题解析
- js实现力扣71题简化路径
- DOM operation
- Translation D28 (with AC code POJ 26:the nearest number)
- 【翻译】Linkerd在欧洲和北美的采用率超过了Istio,2021年增长118%。
- Analysis of rainwater connection
- In depth analysis, Android interview real problem analysis is popular all over the network
猜你喜欢
How to customize animation avatars? These six free online cartoon avatar generators are exciting at a glance!
Detailed idea and code implementation of infix expression to suffix expression
思维导图+源代码+笔记+项目,字节跳动+京东+360+网易面试题整理
腾讯Android面试必问,10年Android开发经验
思維導圖+源代碼+筆記+項目,字節跳動+京東+360+網易面試題整理
IC设计流程中需要使用到的文件
Black Horse - - Redis Chapter
黑马--Redis篇
[calculating emotion and thought] floor sweeper, typist, information panic and Oppenheimer
In simple terms, interview surprise Edition
随机推荐
保证接口数据安全的10种方案
js实现力扣71题简化路径
[infrastructure] deployment and configuration of Flink / Flink CDC (MySQL / es)
如何自定义动漫头像?这6个免费精品在线卡通头像生成器,看一眼就怦然心动!
Benefit a lot, Android interview questions
Carte de réflexion + code source + notes + projet, saut d'octets + jd + 360 + tri des questions d'entrevue Netease
swagger2报错Illegal DefaultValue null for parameter type integer
学习探索-无缝轮播图
Use of map (the data of the list is assigned to the form, and the JSON comma separated display assignment)
Information System Project Manager - Chapter VIII project quality management
部门树递归实现
终于可以一行代码也不用改了!ShardingSphere 原生驱动问世
Interpretation of Dagan paper
MySQL information Schema Learning (i) - - General table
DaGAN论文解读
Cf960g - bandit Blues (type I Stirling number +ogf)
In simple terms, interview surprise Edition
Interview assault 63: how to remove duplication in MySQL?
usb host 驱动 - UVC 掉包
Dark horse -- redis