当前位置:网站首页>[read together] Web penetration attack and defense practice (I)
[read together] Web penetration attack and defense practice (I)
2022-06-24 01:41:00 【Relieved】
The first 1 Chapter 3 basic knowledge of vulnerability scanning :
Vulnerability scanning is a key link in network penetration , Used to discover vulnerabilities in the target server , Let's introduce the basic concepts of vulnerability scanning and analysis .
1.1 Overview of vulnerability scanning, utilization and sharing :
Network attack and defense confrontation , Get through vulnerability scanning , Directory schema 、 Known vulnerabilities and other information , Perform penetration tests on targets through known vulnerabilities , Combined with personal experience , It is very likely to take the backstage management authority . Therefore, vulnerability scanning, utilization and analysis are very key technologies in attack defense confrontation . Mastering these technologies can quickly improve their own penetration level .
1.1.1 information gathering :
1. Basic information collection :
Basic information collection mainly aims to collect all kinds of information , Collect more , The more perfect the penetration plan is , Mainly collect the following information :
1) Server status
2) The server IP Place of ownership
3) Website information
4) Website protection
2. Port information collection :
Port information mainly refers to the open ports of the server where the target master station and its sub stations are located , Collect port and service information provided externally .
3. Target website information collection :
Collect the vulnerability information that has been disclosed by the target through some open vulnerability channels , It is helpful for later scanning and penetration .
1.1.2. Vulnerability scanning :
Vulnerability scanning is a general concept , General vulnerability scanning refers to scanning the target website through vulnerability scanning tools .
1.1.3. Analysis and utilization of scanning results :
The analysis and utilization of scanning results are mainly divided into test vulnerabilities 、 Vulnerability analysis 、 Vulnerability reuse and vulnerability utilization summary 4 In terms of .
1.1.4Web Basic concept of vulnerability :
1. Common vulnerability scoring system
2. General vulnerability disclosure
3.OVAL
4.CWE
5.SCAP
1.1.5 Open online vulnerability testing site :
1.Acunetix web Vulnerability Scanner Test site :
1)html5 type :http://testhtml5.vulnweb.com2) php type :http://testphp.vulnweb.com3) asp type :http://testasp.vulnweb.com4) aspnet type :http://testaspnet.vulnweb.com
2. Other site addresses available for testing :
1)webappsec:http://zero.webappsecurity.com/2) watchfire:https://demo.testfire.net/
1.2. Introduction to network scanning technology :
With the rapid development of network technology , It also brings huge network security risks , How to before an attack occurs “ Enemy and know yourself ” Effective prevention , instead of “ Mend the fold after the sheep have been stolen ”, The scanner is “ you can fight a hundred battles with no danger of defeat ” The sharp weapon of .
1.2.1 The basic concept of scanner :
Scanner is the main means to collect system information , It is an important tool for detecting system security .
1.2.2 Functions of the scanner :
1) Find a host or network
2) Discover what services the host is running ( For example, open those ports )
3) By testing these services , Discover its inherent loopholes
1.2.3 How the scanner works :
The scanner remotely detects the target host TCP/IP Services on different ports , Record goals and give answers
1.2.4 The main technology used by the scanner :
1) Host scanning technology
2) Port scanning technology
3) System scanning technology
4) Vulnerability scanning technology
5) Script scanning technology
1.2.5 Classification of scanners :
There are two types : Host vulnerability scanner (host Scanner) And network distributed vulnerability scanner (Network Scanner).
1.3WAMP Test environment construction :
1.3.1Wampserver install :
Click Install Package , Start installing these options in English (English)
Choose me to accept the agreement
Then lift the installation VC Environmental Science , Search online VC The runtime collection can be installed
Select the installation directory
Select the program version you want to install
Click on Install Start installation
The installation process will improve the use of IE As default browser , After installation, you can use .
Follow up the detailed installation tutorial and usage .
1.3.2XAMPP Environment building :
Click Install Package , Installation
Then enter the installation wizard
Select the program to be installed and the installation path
Then go to the next step until the installation is completed
Follow up the detailed installation tutorial and usage .
1.3.3AppServ Environment building :
Follow up the detailed installation tutorial and usage .
1.3.4phpStudy Environment building :
Follow up the detailed installation tutorial and usage .
1.4 build DVWA Vulnerability testing and scanning environment :
Follow up the detailed installation tutorial and usage .
1.5 build Vulhub Vulnerability testing environment :
Follow up the detailed installation tutorial and usage .
The introduction of this chapter ends , Follow up update slowly .
边栏推荐
- EasyPlayer. JS play m3u8 error net:: err_ EMPTY_ Response, how to solve it?
- "Ai+ education" and "Ai education": one for education and the other for Education
- Blog platform was falsely blackmailed and the new hacker organization claimed responsibility for the Israeli attack | November 16 global network security hotspot
- 【Flutter】如何使用Flutter包和插件
- Note 3 of disruptor: basic operation of ring queue (without disruptor class)
- Digital case show ‖ made in China for the first time! Tencent cloud tdsql landed in Zhangjiagang bank and worked together to build financial business
- What does fortress server mean? What are the benefits of Fortress server installation
- Implementation of asynchronous notification and event callback based on guava API
- What is the website domain name trademark registration process? What is the use of a website domain name trademark?
- How to set up AI speech synthesis? What is the function of speech synthesis?
猜你喜欢

I, a 27 year old female programmer, feel that life is meaningless, not counting the accumulation fund deposit of 430000
![[flutter] comment utiliser les paquets et plug - ins flutter](/img/a6/e494dcdb2d3830b6d6c24d0ee05af2.png)
[flutter] comment utiliser les paquets et plug - ins flutter

【Flutter】如何使用Flutter包和插件

It's too difficult for me. Ali has had 7 rounds of interviews (5 years of experience and won the offer of P7 post)
![[SQL injection 13] referer injection foundation and Practice (based on burpseuite tool and sqli labs less19 target platform)](/img/b5/a8c4bbaf868dd20b7dc9449d2a4378.jpg)
[SQL injection 13] referer injection foundation and Practice (based on burpseuite tool and sqli labs less19 target platform)
![[SQL injection 12] user agent injection foundation and Practice (based on burpsuite tool and sqli labs LESS18 target machine platform)](/img/c8/f6c2a62b8ab8fa88bd2b3d8f35f592.jpg)
[SQL injection 12] user agent injection foundation and Practice (based on burpsuite tool and sqli labs LESS18 target machine platform)
随机推荐
Best practices cloud development cloudbase multi environment management practices
SAP mm maintains inter company sto error -no delivery type defined for supplying
How to create a group on a barcode label
How to build high quality and high brand websites what should be paid attention to in the construction of enterprise websites
What does fortress server mean? What are the benefits of Fortress server installation
What is pension finance? What are the pension financial products?
Easynvr background channel list timing request touchstreamclient interface optimization
Output type SPED trigger inbound delivery after PGI for inter-company STO's outb
2021-11-18: given a length len, it indicates how many bits there are in total. All characters
[new secsha!] Have you got the 22 year new seckill activity of Tencent cloud?
Online and offline integrated operation of channel sales system in the home furnishing industry to promote product update and iteration
How to make a fixed asset identification card
What is the relationship between the Internet of things and artificial intelligence?
SAP executes PGI on the delivery order of STO and reports an error -fld selectn for Mvmt type 643 acct 400020 differences
Introduction to trusted service manager
Cloud computing "keeping the promise"
Talk about 11 tips for interface performance optimization
A marriage app_ T signature analysis
How about speech synthesis? Is speech synthesis effective?
How to build a high-quality website