To do web development, we often do code walk-through, many times, we will check some core features, or often appear the logic of loopholes. Along with the technical team's growth, the crew technology matures. Common fool-type SQL injection vulnerabilities, and XSS vulnerabilities. will be less, but we will also find that some emerging hidden vulnerabilities occasionally emerge. These vulnerabilities are more from developers, to a function, common modu
in the cookies, has the website to have the user name and the password to keep together in the cookie, each time accesses according to the user name and the password carries on the examination, then judges whether legally. So this loophole is actually used alone is not very effective, but with other intrusion is much better, such as the download of a site database, but the password is MD5 encryption, unless the violence to crack out the value of MD5 hash, otherwise can not landing on the site,
In the previous articles, we analyzed and described common Web Security Vulnerability attacks and prevention methods, we also learned that Web security vulnerabilities have a huge impact on website security operations and protection against leaks of Enterprise sensitive information. Therefore, we can effectively prevent Web
example, an attacker could send a maliciously crafted malicious URL to the victim via e-mail, IM, or other means. When the victim opens the URL in a Web browser, the Web site displays a page and executes the script on the victim's computer.
Testing XSS Vulnerabilities
I've been a full-time security advisor for years, and I've done this countless times. I boil down the good test plan to two words: thorough.
to get permission to download programs and run programs. Below I give an earlier vulnerability of IE browser to explain these two problems separately.
⒈ Automatic Download program
Tip: Code Description
A. The attribute of "src" in the code is the network address of the program, in this case "Http://go163go.vicp.net/1.exe" is the Gray Pigeon Server installation program that I placed on my website, which allows the
a_variable to be a number related to the ID field. However, if the end user chooses a string, it bypasses the need for escape characters. For example, set A_variable to: 1;drop tableusers, which removes the "Users" table from the database, and the SQL statement becomes: SELECT * from DATA WHERE id = 1;drop table users;3. Vulnerabilities in the database server sometimes, there are vulnerabilities in the database server software, such as the mysql_real_escape_string () function
or FTP), but more often, people are using unsecured versions of these protocols. Some protocols, such as the mSQL database service, provide virtually no validation mechanism.
It's a good idea for Web administrators to from outside the company and test and simulate attacks on their own websites to see what happens. Some services have been started in the default configuration after machine installation, or some services have been started due to inst
cookie, you need access to 32 subdomains. Load 32 script When accessing cookies, high overhead, slow reading of cookies2, as a security vulnerability, the future major browser manufacturers are estimated to fix this bugAdvantages:Cross-site, browser Close or clear cookies can not delete the HSTS Super cookie above the explanation is a bit verbose, concise is the use of HSTS loopholes, 32 sub-domains for the database (each subdomain represents 1
the blockchain website security detection, and security xxx process, found a lot of web site vulnerabilities, for the blockchain vulnerability we summarized as follows: The general site vulnerability exists in the site of the logical loophole, in the member registration, member login, blockchain address management: Like charge, transfer, coin. Escrow, buy and se
The openness of the Internet makes Web systems face the threat of intrusion attacks, and building a secure Web system has always been the goal of people. A practical method is to establish a relatively easy-to-implement relatively secure system and establish a corresponding security auxiliary system according to certain security policies. Vulnerability scanner is
Extraterrestrial virtual Host read file vulnerability across directory, need certain conditions.The problem occurs in the following files, which do not have strict set execution permissions and that the current IIS users can successfully execute commands:C:\windows\7i24iislog.exec:\windows\7i24iislog2.exec:\windows\7i24iislog3.exec:\windows\7i24iislog4.exec:\ Windows\7i24tool.exec:\windows\rsb.exeThese files seem to be out-of-process logs, set permiss
Safety
How to better achieve the prevention of hacker attacks, I mention personal views! First, the free program does not really have a fee, since you can share the original code, then the attacker can analyze the code. If you pay attention to precautions in detail, your site's security will be greatly improved. Even if there are vulnerabilities such as SQL injection, attackers will not be able to take your site immediately. Due to the ease of use of ASP, more and more
The openness of the Web is widely welcomed, but at the same time, the Web system will face the threat of intrusion attacks. We have always wanted to build a secure Web system, but full security is almost impossible, but relative security can be achieved. Web vulnerability sc
Cross-station attacks, that is, cross site Script Execution (usually abbreviated as XSS, because CSS is the same name as cascading style sheets, and therefore XSS) refers to an attacker using a Web site program to filter user input, and enter HTML code that can be displayed on the page to affect other users. Thereby stealing user information, using the identity of a user to carry out some kind of action or to the visitor to carry out a virus attack wa
Test system:
Move easy (powereasy CMS SP6 071030 the following version)
Security Overview:
Dynamic Web site management system is a use of ASP and MSSQL and other other kinds of database construction of efficient Web site content management Solutions products.
Vulnerability Description:
Vote.asp called the dynamic component Pe_site.showvote, this component voteo
After analyzing CGI interfaces for a period of time, I feel that various WEB interfaces have been analyzed for a period of time. I feel that various WEB servers are not very uniform with some variables and do not understand some security requirements, this section briefly analyzes some security vulnerabilities. Because it is based on some personal understanding and analysis, errors are inevitable. I hope yo
regaling existing all kinds of IE web trojans lack of it!
The first: Using the old mime loophole of IE Web Trojan
This trojan is still popular, but because this loophole is too old and the application of IE version less, and the impact is too large, patch almost all up, so the success rate of this Trojan is relatively low.
The second: Using com.ms.activeX.ActiveXComponent
0x01 File Upload Vulnerability IntroductionIn order for users to upload files to a Web site, it is like opening another door to a malicious user of a crisis server. Even so, in today's modern Internet Web applications, it is a common requirement because it helps to improve business efficiency. Enterprise Support Portal, to the users of enterprise employees to eff
vulnerability mining or hacking, so the introduction of the vulnerability will be a simple explanation, if you are interested I will write another article to specifically describe the various types of vulnerability detection methods and utilization methods. Due to the long development cycle of the scanner, all the design and coding are done by me, some of which
Wapiti lightweight Web security vulnerability scanning tool and wapiti scanning toolWapiti is a Web application vulnerability check tool. It has a "dark box operation" scan, that is, it does not care about the source code of the Web application, but it will scan the deployme
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.