当前位置:网站首页>Vulnerability discovery - API interface service vulnerability probe type utilization and repair
Vulnerability discovery - API interface service vulnerability probe type utilization and repair
2022-06-26 06:26:00 【Dark white earphone】

Test ideas
Information collection and information utilization
First step : First, identify whether the website has cdn,waf Products such as , If there is, it will be bypassed .
The second step : Scan the port information collected from the website , real ip Address ,ip Bound other domain names .
The third step : Website sensitive path scanning
Step four : domain name + Port sensitive information scanning
Step five :ip+ Port sensitive directory scanning
remarks : Dictionaries should not be just sensitive paths , There should also be backup files zip rar tar tar.gz Etc
Port service class security test
According to the previous information collected for the target port service class probe after the security test , It's mainly about attack methods : password security ,WEB
Class vulnerability , Version vulnerability, etc , The harm can be great or small . Belongs to port service / Third party service security testing surface . Generally in
The security test scheme selected in the case of known applications without ideas .
API Interface -WebServiceRESTful API
https://xz.aliyun.com/t/2412
According to the functional direction of the application itself , The safety test objectives need to have API Interface calls can be used for such tests , Mainly involved in safety
The whole question : Self safety , coordination WEB, Business logic, etc , The harm can be great or small , Belongs to the application API Interface network service
Service test surface , Generally, it is also a test scheme in the case of interface call .
WSDL( Network service description language ,Web Services Description Language) It's based on XML Language , Used to describe
Web Services And how to access them .
Vulnerability keywords :
coordination shodan,fofa,zoomeye Search is also good ~
inurl:jws?wsdl
inurl:asmx?wsdl
inurl:aspx?wsdl
inurl:ascx?wsdl
inurl:ashx?wsdl
inurl:dll?wsdl
inurl:exe?wsdl
inurl:php?wsdl
inurl:pl?wsdl
inurl:?wsdl
filetype:wsdl wsdl
http://testaspnet.vulnweb.com/acuservice/service.asmx?WSDL

Domain information collection
1. Subdomain collection
2. Search the other party's domain name through the domain name registration platform , View the registered domain name related to the target domain name ( These domain names have different suffixes , But usually the same person registers )
3. Search the keyword of the target website through the browser
4. Domain name access and IP visit , The directory may be different :
When collecting, you should not only scan the directory under the domain name , You have to scan ip Under address .
Goby Port scanning ( give an example )
Find out 4848 port . It can also be used. Nmap.
Baidu's corresponding service vulnerabilities 
Super weak password detection tool
https://github.com/shack2/SNETCracker/releases
WSDL
WSDL( Network service description language ,Web Services Description Language) It's based on XML Language , Used to describe Web Services And how to access them .( Mainly used for interface )
API The interface test
https://xz.aliyun.com/t/2412
AWVS scanning
The scanned results exist SQL Inject holes 
Copy the packet , stay sqlmap The installation directory , Create a new document
Copy the packet into .
But pay attention to awvs The test statement of is deleted .
Write any parameter here , Add after *, tell sqlmap To test here 
sqlmap To test 
Inject success 
边栏推荐
- Logstash -- send an alert message to the nail using the throttle filter
- Data visualization practice: Data Visualization
- Number of connections server database message: error number 2003can't connect to MySQL server on 'server address' (10061)
- TCP connection and disconnection, detailed explanation of state transition diagram
- Keepalived to achieve high service availability
- Tencent's 2022 school recruitment of large factories started with salary, and the general contracting of cabbage is close to 40W!
- China micro cultivator market trend report, technical dynamic innovation and market forecast
- Import export simple
- js-下载图片
- Go学习笔记1.3-变量的数据类型篇
猜你喜欢

Five solutions across domains

Evolution history of qunar Bi platform construction

TCP連接與斷開,狀態遷移圖詳解

EFK昇級到ClickHouse的日志存儲實戰

Underlying principle of MySQL index
![[micro service series] protocol buffer dynamic analysis](/img/86/357d55c77cc67d6413af2de59bf395.png)
[micro service series] protocol buffer dynamic analysis

When vs code uses prettier to format JS, there is a space between the name of the function definition and the parentheses, and ESLIt does not allow this space

MySQL 索引底层原理

A tragedy triggered by "yyyy MM DD" and vigilance before New Year's Day~
[alluxio & Dachang] the original boss direct employment was applied in this way
随机推荐
Install pyinstaller
Mongodb -- use mongodb to intercept the string content in the field and perform grouping statistics
Playing RTSP streaming video on Web pages (webrtc)
打印数字的位信息
Gof23 - prototype mode
工作积累——Web请求中使用ThreadLocal遇见的问题
Data visualization practice: Data Visualization
Gof23 - builder mode
Pytorch mixing accuracy principle and how to start this method
Failed to configure a DataSource: ‘url‘ attribute is not specified and no embedded datasource could
Use the fast proxy to build your own proxy pool (mom doesn't have to worry about IP being blocked anymore)
技术能力的思考和总结
DS18B20详解
Architecture design method
自顶向下的变成方法
DPDK——TCP/UDP协议栈服务端实现(二)
Experience the new features of Milvus 2.0 together
【Spark】Spark SQL 字段血缘如何实现
Mongodb——使用Mongodb对字段中字符串内容进行截取,并进行分组统计
Library management system