Popular ways to attack websites

Source: Internet
Author: User
Tags set time

1, Webshell Backdoor

Webshell is a kind of command execution environment which exists in the form of ASP, PHP, JSP or CGI, or it can be called as a kind of web backdoor. After hacking into a web site, hackers typically use these ASP or PHP backdoor files with the Web server
Web directory under the normal Web files mixed together, and then you can use the browser to access these ASP or PHP back door, get a command execution environment to control the purpose of the Web server (can upload download files, view the database, execute any program
command, etc.)

In other words, Webshell is a "normal" script file (which says it is normal, from the point of view of text), while Webshell's malice is manifested in its implementation function, also called back Door, is a malicious purpose of the normal script code (mareware )

2. SQL Injection

With the development of B/s pattern application development, more and more programmers use this model to write applications. However, due to the varying levels and experience of programmers, a large number of programmers write code without judging the legality of user input data, which makes the application a security risk. The user can submit a database query code, according to the results returned by the program, to obtain some of the data he wants to know, this is called SQL injection, that is, SQL injection.

3, Caidao Webshell

Kitchen knife Webshell

4. Backup File Attack

Backup files for attacks

5, Information Leak Attak

Information breach attack

6. Command Injection Attack

Command injection attack

7. XSS Attack

Cross-site scripting attacks

8. DDos Attack

Distributed denial of service (ddos:distributed denial of services) attack refers to the use of client/server technology to unite multiple computers as an attack platform to launch a DDoS attack on one or more targets, thereby multiplying the power of a denial of service attack. Typically, an attacker would use a theft account to install a DDoS master program on a computer, where a set time master will communicate with a large number of agents, and the agent is already installed on many computers on the network. An agent launches an attack when it receives an instruction. With client/server technology, the master program can activate hundreds of agents within seconds.

In fact, eight claw fish Bidding network every day is facing the above various attacks, so want to do a good bidding site, but also a free bidding site is a very difficult thing.

Popular ways to attack websites

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.