target site directory and then escalate the permission. In this case, the website and server are successfully destroyed.
2. Detailed Process
Recently, a company leader asked me to take a look at the website security situation when I was a graduate student, and agreed with me as soon as possible. This test made me depressed several times, so I decided to write it down to make it easy for audience.After preliminary information collection, it is found that the target server environment is Win2003
with HTML5 new tags to attack, if the use of "white list", this will be less hidden.Five, the common front-end framework to prevent XSS attacksReact all strings are escaped by default. AngularJS uses the SCE in AngularJS to defend against XSS attacks.VI. Web Security scannersCommercial software: IBM Rational Appscan, WebInspect, Acunetix WVS free software: W3AF, Skipfish------------------------------------
is supported.
Darkmysql (http://vmw4r3.blogspot.com /)Only MySQL is supported.
Promsid premium (http://forum.web-Def... 02 postcount = 15)Only MySQL is supported.
Acunetix WVS (Http://www.acunetix.com/vulnerability-scanner/download.htm)Automatically checks web application SQL injection, XSS attacks, and other Web vulnerabilities.
Yinjector (http://y-osirys.com/...-softwares/id10)Only MySQL is supported.
Bo
"Experimental Purpose"1. Understanding the Awvs--web Vulnerability Scanning Tool2. Learn how to use Awvs"Experimental principle"Awvs (Acunetix Web Vulnerability Scanner) IntroductionWVS (Web Vulnerability Scanner) is an automated Web Application security Testing tool that scans Web sites and Web applications that can be accessed through a Web browser and that follow HTTP/HTTPS rules. For any small and medium-sized and large enterprise intranet, extran
Acunetix Wvs_console is a command-line-based gadget that works like a GUI. In some cases it is more convenient to use console directly than to point to the GUI. Common options:/scan set scanned URLs such as:/scan http://www.demo.com//scanlist settings scan files. For example, the url/profile specified scanning policy in the/scan C:\list.txt scan list.txt, WVS provides a variety of policy files, under Data/p
I would like to summarize the PHP code auditing and vulnerability mining ideas here. They are both personal points of view. If there are any mistakes, please point them out.
A large part of PHP vulnerabilities are due to the lack of experience of programmers. Of course, they are related to server configurations, but they are part of the system security category and I do not know much about them, today, I want to talk about some ideas and understandings about PHP code auditing and vulnerability m
There are a wide variety of scanning software available on the market, which can be summarized as two types
1. Client software (such as WVS, Nessus..., metaspo.pdf ..)
2. B/S mode (like 360 online scanning, know chuangyu ...)
Let's talk about the client. Some development companies are responsible for updating plug-ins. Billing accounts for a large part
In terms of the scanning effect, it is comprehensive. No matter what website, the scanning is comple
overflow testing. it is also a platform for exploits and testing vulnerabilities. It integrates common overflow vulnerabilities and popular shellcode on various platforms and is constantly updated, making it easy and easy to test buffer overflow.
Metasploit security testing tools can be used to perform many tasks in penetration testing. you can save your operation logs and even define how each server load clears itself after it is run. It is worth mentioning that this powerful tool is free of c
]backlion]# cd/opt[Email protected] backlion]#git clone https://github.com/grayddq/PublicSecScan.gitSecond,Server DeploymentSystem environment:">ubuntux64 IP address:">192.168.1.121. Enter the OPT directory[Email protected]:~ #cd/opt2. Download the scan item Publicsecscan[Email protected]:~# Git clone https://github.com/grayddq/PublicSecScan.git3. Go to the Publicsecscan directory[Email protected]:~ #cd Publicsecscan4. Install the PublicsecscanPipinstall-r Requirements.txt5 Configure the Lib/con
ModSecurity is an engine for intrusion detection and prevention. It is mainly used for Web applications and can also be called Web application firewall. it can be run as a module or a separate application of the Apache Web server. ModSecurity aims to enhance the security of Web applications and protect Web applications from known and unknown attacks. This article mainly introduces the idea of an open source WAF penetration testing competition.1. BackgroundModSecurity SQL Injection Challenge (A p
/lampsecurity/Summary: Lampsecurity is a VM image designed for Linux,apache,php,mysql security testingName: the Bodgeit StoreProject address: http://code.google.com/p/bodgeit/Summary: Bodgeit is a Java-written vulnerability Web programName: WackopickoProject address: Https://github.com/adamdoupe/WackoPickoSummary: Wackopicko is a vulnerable Web application for testing Web application vulnerability scanning tools———————————————————————————————————————————————–Online list of web vulnerability prog
messages to originate from a trusted source. It is also worth noting that this vulnerability is not limited to PHP; it may affect any application that sends e-mail based on any user input. detecting e-mail header injection vulnerabilitiesin order to automatically detect e-mail header injection, we need to rely on the mediation service, because the detection of such a vulnerability requires an out-of-band and time-delay vectors. Acunetix during au
Modsecurity is an intrusion detection and blocking engine that is primarily used for Web applications so it can also be called a Web application firewall. It can be run as a module of the Apache Web server or as a separate application. The purpose of modsecurity is to enhance the security of Web applications and protect Web applications from known and unknown attacks. This paper mainly introduces the idea of a penetration testing competition for open source WAF.1. Article backgroundModsecurity S
Tags: SQL injection combat1. Collect informationIt took a long time to browse job.xxx.edu.cn , here only to write some information behind the invasion will be used, this site is a technology company in Shenzhen, in the homepage of the Login window part of the three kinds of personnel, respectively, are employing units, graduates and administrators. 650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M00/77/AD/wKioL1ZrpBryNAvfAABUShPOSdY749.png "style=" float: none; "title=" 1.png "alt=" Wkiol
Information Server. After opening it, we found it was a grand billing business management system. Let's take a look. It's a demonstration page. There are some links, one of which is the link to download the demo package. The following file is found during the download process: download. jsp has caught attention. Open the source file and check it. Intuition tells me that this program has a vulnerability, at least at the download level. But I have never learned java, so I threw it into
Today listened to the various explanations of Daniel, in the heart felt particularly deep, as a novice infiltration, I summed up some infiltration skills1, the principle is the keyYou can read these books carefully, and only a deep understanding can become Daniel.A, SQL injection attack and defenseB, upload vulnerability attack and defenseC, XSS Cross-site scripting attack and defenseD, command execution vulnerability attack and defenseE, Kali penetration test combatF, Sqlmap Use tutorialG, Burp
Upload a place, upload a path, upload a verification, upload a breakthroughUpload place: Permission to upload (must login to the background, to browse the upload page. )No permission to upload (anyone can upload, just find the upload address.) )Upload path: According to the name of the uploaded file names, and other based on time, date and other names.Upload Verification: Client Authentication (local JS authentication), server-side validation (script validation)Verify suffix format, size, conten
Bugscan (bugscan.net) is a scanning platform for B/S segments recently developed by a Chinese god. You only need to set up a python environment locally to scan your website in an all-round way, the new scanner also provides plug-in APIs to allow users to write plug-ins themselves and share the plug-ins with users. Small make up local test, scanning speed and results are very powerful, especially the crawler is very in place.The original text is as follows:There are a wide variety of scanning sof
0x1: Information Network collectionThe curl header can be used for reference based on the penetration experience of the small series. The header can be obtained as follows: here, the centos installation curl yum install curl is automatically installed. Use the curl-I url Command to check the server information. Here, we can see that the web application service architecture is ubuntu php apache. the web program is php ip Lookup: www.2cto.com ip Address: ip address is used in this forum for the sa
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.