Author: Xuan soul
Series navigation http://www.cnblogs.com/xuanhun/archive/2008/10/25/1319523.html
Security Technology Zone http://space.cnblogs.com/group/group_detail.aspx? Gid = 100566
Preface
The web security practice series focuses on the practical research and some programming implementation of the content of hacker exposure-
13down Votefavorite6
I have a WCF client connecting to a Java based AXIS2 Web service (outside my control). It is about to has ws-security applied to it, and I need to fix the. NET client. However, I am struggling to provide the correct authentication. I am aware that WSE 3.0 might make it easier, but I would prefer not to revert to an obsolete technology.Similar issues (unsolved), include this, this an
20155201 Network attack and Defense technology Experiment Nine web Security Foundation One, the practice content
The objective of this practice is to understand the basic principles of commonly used network attack techniques. Webgoat the experiment in practice.
Ii. contents of the report: 1. Basic question answer 1) SQL injection attack principle, how to defend
SQL injection means tha
other editors to generate Some.asp.bak file leakage problem.
Security update
Apply all the Service packs required and regularly update the patches manually.
Installing and configuring Antivirus protection
Recommended nav 8.1 virus firewall (configured to upgrade at least once a week).
Installing and Configuring firewall protection
Recommend the latest version of the BlackICE Server Protection firewall (simple configuration, more practical)
Monitoring
Web Security is the two focus that our Test team has been keeping abreast of performance tests . The process of development also needs to pay attention to the escape of the place to escape, the shielding of the local shielding, the filter of the local filter and so on. At the end of the year, there is bound to be a large number of lottery raffle activities such as development, on-line, in this process, the
For Linux System Web Server Security-Linux Enterprise Application-Linux server application information, the following is a detailed description. To protect Web host security, remove unnecessary services. Before removing unnecessary services, you must first specify the type of host you want to create. There are three ty
output the absolute database path to the client, as shown in
When the database path is leaked, attackers can download the database to the local computer and find the background Administrator account and password in the table, so that they can easily access the background management of the website, this vulnerability is only applicable to ACCESS databases and does not affect SQL server databases. The brute-force database of the power system has been suffering for a long time. Last year, 360 comp
As we all know, Microsoft products always attract hackers, and IIS is no exception.
What is IIS
As one of the popular Web servers, IIS provides powerful Internet and Intranet services. Therefore, there are still many units that use IIS as Web server software. By default, these servers must allow public access to their resources. However, we found that many organizations spend far more time defending against
1. Security attacks1, SQL, HTML, JS, os command injection2, XSS Cross-site scripting attacks, using trusted users in the site, insert malicious script code on the Web page3. CSRF Cross-site request forgery, leveraging trusted Web sites by disguising requests from trusted users.4. Directory Traversal Vulnerability5. Parameter tampering6. Session Hijacking2. Summar
The Scripting.FileSystemObject object is one of many COM objects provided by Scrrun.dll for Vbscript/jscript control. Scripting.FileSystemObject provides a very convenient access to text files and file directories, but it also poses a threat to IIS Web server data security.
Filefinder's code is simple, consisting of 3 functions and 30 lines of sequential code.
The most critical is the FindFiles function,
Acunetix Web Security scan artifact feature1. Automatic scan of Login Protection pageThe areas where a website is most likely to be attacked and vulnerable are often those that require users to log in.So the latest version of Acunetix is now able to automatically and easily navigate through complex validation areas, eliminating the need for manual intervention often.This includes the ability to scan
Anti-Black 15 tricks to protect the security of Enterprise Web Servers
Here we provide 15 protection techniques to help IIS administrators protect Web servers at a very low cost.Of course, before talking about these techniques, we should first develop a set of security policies.The first step to protect
Web security practices (8) attack iis6.0
Through the previous discussion, we have learned how to determine the type of web server. This section continues to discuss web platform vulnerability attacks. The defect mentioned here is the defect of the server itself, not the defect caused by the Administrator's configuratio
Burp Suite is an integrated platform for attacking Web applications. It contains a number of tools and has designed many interfaces for these tools to facilitate the process of speeding up attacks on applications. All tools share a powerful extensible framework that can handle and display HTTP messages, persistence, authentication, proxies, logs, alerts. This article describes its main features under:1.Target (target)--a feature that shows the structu
1. Database Security
1. MSSQL database security
L sa-level users are not allowed to connect to the database on the web.
Solution:
Delete the sa user and create a new user with the sa permission. the user name and password are as complex as they are. To prevent brute-force cracking.
Create a web connection user, remo
Dropbox's Web Security Protection Policy II: unsafe-inline instruction and random number Configuration
One of Dropbox's Web security protection measures is to use content-based security policies (CSPs ). Devdatta Akhawe, a security
First, IntroductionCSP is the abbreviation for Web Security Policy (Content security Policies). is a developer-defined security Policy statement that specifies a trusted source of content through the responsibilities that are constrained by the CSP (content can refer to remote resources such as scripts, pictures, style
Based on existing cryptography and XML encryption and signature industry standards, Ws-security provides a comprehensive set of security features for WEB service applications that you can use Ws-policy and Ws-securitypolicy to specify which features are available to a particular application. This allows the service client to configure itself to access the service
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.