当前位置:网站首页>(3) Web security | penetration testing | basic knowledge of network security construction, IIS website construction, EXE backdoor generation tool quasar, basic use of
(3) Web security | penetration testing | basic knowledge of network security construction, IIS website construction, EXE backdoor generation tool quasar, basic use of
2022-07-06 19:42:00 【Black zone (rise)】
First, learn to use IIS Build a website
Common build platform scripts are enabled
ASP,PHP,ASPX,JSP,PY,JAVAWEB Such as the environment
domain name IP Directory resolution security issues
① adopt IP Address access can find more information , Sometimes you can find program source code backup files and sensitive information
② Domain name access can only find all files in one folder ,ip Access is the upper level of domain name access .
③ Support when building the website IP Access and domain name access , Domain name access points to a directory ,IP Access points to the root directory .
Common file suffix resolution corresponds to security
Specifies that the suffix corresponds to a file , If you encounter a file that cannot be parsed when accessing the website, the middleware may default or add some settings, resulting in problems in parsing .
Set print processing specific program requests
Safety protection in common safety tests
Internal websites of schools and enterprises , Will restrict external access to internal websites , Limit IP Address , Regulate the permissions of visitors . Authentication and access control , User based restrictions , Limit IP Address access , Authorized access - Only specified IP The address can be accessed . Access denied - Appoint IP Address denied access .
WEB Back door and user and file permissions
exe Back door generation tool Quasar
link :https://pan.baidu.com/s/15XpECQY8SKJwIBxsTy_F3Q
Extraction code :hj12
Usage method :
Folder settings related permissions , Disable guest user permissions , Cause the connected back door to see nothing , It's a protective skill , It is also a common problem in security testing
Brief identification based on middleware
The data packet returned by fetching , Query the platform information
service:nginx/1.8.0
web Summary of common middleware vulnerabilities
link :https://pan.baidu.com/s/1NKejdCI_UY8syRIDfVZwEg
Extraction code :hj12
边栏推荐
- Zero foundation entry polardb-x: build a highly available system and link the big data screen
- 【基础架构】Flink/Flink-CDC的部署和配置(MySQL / ES)
- Phoenix Architecture 3 - transaction processing
- 蓝桥杯 微生物增殖 C语言
- MySQL information schema learning (I) -- general table
- Use of deg2rad and rad2deg functions in MATLAB
- 【计算情与思】扫地僧、打字员、信息恐慌与奥本海默
- Li Kou 101: symmetric binary tree
- How to do smoke test
- GCC [7] - compilation checks the declaration of functions, and link checks the definition bugs of functions
猜你喜欢
随机推荐
冒烟测试怎么做
企业精益管理体系介绍
Leetcode 30. Concatenate substrings of all words
short i =1; i=i+1与short i=1; i+=1的区别
凤凰架构2——访问远程服务
Classic 100 questions of algorithm interview, the latest career planning of Android programmers
腾讯Android面试必问,10年Android开发经验
Is not a drawable (color or path): the vector graph downloaded externally cannot be called when it is put into mipmap, and the calling error program crashes
Learn to explore - use pseudo elements to clear the high collapse caused by floating elements
打家劫舍III[后序遍历与回溯+动态规划]
Information System Project Manager - Chapter VIII project quality management
USB host driver - UVC swap
Looting iii[post sequence traversal and backtracking + dynamic planning]
广州首个数据安全峰会将在白云区开幕
Analysis of rainwater connection
In simple terms, interview surprise Edition
Interview assault 63: how to remove duplication in MySQL?
LeetCode_双指针_中等_61. 旋转链表
Hudi vs Delta vs Iceberg
力扣101题:对称二叉树