Two days ago at the request of the boss to the company a channel to do a log analysis
Note: XXX represents a domain name or a certain information
First, log records analysis
Vulnerability 1: File Upload vulnerability risk level: very serious
Through the log analysis, found that hackers in February 22, 2014 with http://xxx/css_edit/css.php (later changed to cssx.php) fil
Manual vulnerability Mining-----SQL BlindsDo not display database built-in error messagesBuilt-in error messages help developers identify and fix problemsError messages provide a lot of useful information about the systemWhen the programmer hides the error message in the database and replaces it with a generic bug, SQL injection willCan not judge the result of in
Label:All default installation configurations for MySQL (5.7, 5.6, and 5.5), including the latest version, allow attackers to exploit the vulnerability remotely and locally. The vulnerability requires authentication to access the MySQL database (via a network connection or a Web interface like phpMyAdmin), as well as through SQL injection exploits. An attacker wh
injection statement can not contain single quotes, the Battle of course we can easily rao this limit, I like to use the CHAR function in SQL Rao, just on the hand of the study of the dynamic system write the char coding tool, first look at the Oblog database table structure, in the Oblog_ The admin table we are interested in only Id,username and password fields, first burst out the Admin user or ID unique Administrator account password to see:
Http:/
before learning to infiltrate, although also played the Universal password SQL Injection Vulnerability landing site backstage, but only will use, do not understand its principle. Today learning C # Database This piece, just learned this knowledge, just understand the original is how.Well-known universal password SQL Injection vulnerability, we believe very famili
easily rao this limit, I like to use the CHAR function in SQL Rao, just on the hand of the study of the dynamic system write the char coding tool, first look at the Oblog database table structure, in the Oblog_ The admin table we are interested in only Id,username and password fields, first burst out the Admin user or ID unique Administrator account password to see:
Http://www.target.com/user_blogmanage.asp?action=Movesubject=1id=1 and 1= (select pas
has become the key, you may think of setting a good serv-u directory permissions, security can be guaranteed, in fact, security is a whole. Most of the time, the Web server is installed on the server with Serv-u, we have to take the two into account, to make the security well.
One analog intrusion
We can find the relevant serv-u loopholes in the past year from the "Green Union" vulnerability database of
Wordpress4.2.3 privilege escalation and SQL Injection Vulnerability (CVE-2015-5623) AnalysisThis is a vulnerability that you have been paying attention to over the past few days. wordpress released version 4.2.4 last week, which mentioned fixing possible SQL vulnerabilities and Multiple XSS.Check point was quickly analyzed. I also analyzed and reproduced the latest vuln
the user can input data to intervene.
Display input can be divided into two types:
1. Input finished immediately output the result
2. Input completion is stored in a text file or database, and then the result is output
Note: The latter may make your site unrecognizable! :(
Implicit input, in addition to some normal cases, can also be implemented using a server or CGI program to handle error messages.
"Vulnerabil
Recently, the sebug reported that Drupal7.x has a PHP code execution vulnerability, but no one has analyzed it, so I had to write down the source code myself. I learned the cause of the vulnerability from the blog of the security researcher on the official website. I feel that this issue is a bit of a title. This vulnerability is just a reinstallation
or FTP), but more often, people are using unsecured versions of these protocols. Some protocols, such as the mSQL database service, provide virtually no validation mechanism.
It's a good idea for Web administrators to from outside the company and test and simulate attacks on their own websites to see what happens. Some services have been started in the default configuration after machine installation, or some services have been started due to inst
My personal mailbox many times received cosmetics advertising mail, it does not feel like a poison, so point open connection to see, originally is a Sales cosmetics business website. Look prettier, just don't know how safe it is? Previously noted Providence Business Network, but this stranger, I do not know what the system (as shown in Figure 1).
Figure 1
Habitually to see whether there is no upload, incredibly did not find any upload pictures or other Dongdong place. Do not forget, register
first, the steps of SQL injectionA) to find injection points (such as: Login interface, message board, etc.)b) The user constructs the SQL statement (for example: ' or 1=1#, which is explained later)c) Send SQL statements to the database management system (DBMS)D) The DBMS receives the request and interprets the request as a machine code instruction to perform the necessary access operationse) The DBMS accepts the returned result and processes it back
run in any setting status on the server. You can use get_magic_quotes_runtime at the beginning of the entire program to check the setting status to determine whether to manually handle the problem, or use set_magic_quotes_runtime (0) to disable it at the beginning (or when automatic escape is not required.
5. file vulnerability prevention
For PHP file leakage, you can set and configure the server for defense purposes.
The specific operations are as f
Event Background:
Recently, many websites have been attacked. After research and analysis by quickshield Security laboratory, these websites use DedeCMS content management systems. DedeCMS has a very serious vulnerability, attackers can directly write a "one-sentence Trojan" to the server ".
The cause of the DedeCMS vulnerability is mainly caused by variable coverage. By submitting variables, attackers ov
Solve the 6, ASP Program Password Verification Vulnerability
Vulnerability Description:
Many web sites put passwords into the database and use the following SQL for login verification (for example, ASP)
Sql= "SELECT * from user where username= '" username "' and Pass= '" Pass ' "
At this point, you simply construct a special username and password based on SQL,
EMail: rayh4c # 80sec.com Site: www.80sec.com Date: 2011-10-13
0 × 00 Preface
As we all know, the risk definitions of XSS vulnerabilities have been vague, and cross-site scripting (XSS) vulnerabilities are both high-risk and low-risk vulnerabilities that have been controversial for a long time. There are two types of XSS vulnerabilities: persistent and non-persistent:
1. The non-persistent XSS vulnerability is generally found in URL parameters. You ne
0-day security: software vulnerability analysis technology (version 2nd)
Basic Information
Author:Wang QingZhang DonghuiZhou HaoWang JigangZhao Shuang
Series Name:Security Technology Department
Press: Electronic Industry Press
ISBN:9787121133961
Mounting time:
Published on: February 1, June 2011
Http://product.china-pub.com/194031
0-day security: software vulnerability analysis technology (version 2nd)
Int
This article [email protected]Originally from: https://bbs.ichunqiu.com/thread-42943-1-1.html0x00 the vulnerability in printf functions the family of printf functions is a common function family in C programming. In general, we use the form of printf ([formatted string], arguments) to make calls, such asHowever, sometimes for the sake of convenience can also be writtenIn fact, this is a very dangerous notation. Due to a design flaw in the printf funct
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.