2017-2018-2 20155314 "Network countermeasure Technology" EXP8 Web Foundation
Directory
- Experimental content
- Experimental environment
- Basic question Answer
- Pre-knowledge
- Experimental steps
- 1 Apache Installation and configuration
- 2 Front-end programming
- 3 Back-end programming PHP installation and configuration
- 4 installation and configuration of MySQL
- 5 Simple SQL injection with XSS
- The problems encountered in the experiment and the solving process
- Experiment Summary and experience
- Resources
Back to Catalog
Experimental content
Web front-end HTML (0.5 points)
Can install normally, start and stop Apache. Understand the HTML, understand the form, understand the get and post methods, and write an HTML containing the form.
Web Front end Javascipt (0.5 points)
Understand the basic JavaScript functionality and understand the DOM. Write JavaScript to verify the user name, password rules.
Web backend: MySQL Foundation: normal installation, start MySQL, build library, create user, change password, build table (0.5 points)
Web backend: Writing PHP Web pages, connecting databases, authenticating users (1 points)
Simplest SQL injection, XSS attack test (1 points)
Function Description: User can login, login user name password saved in the database, login successfully display welcome page.
Project leader needs to complete: after landing can post; session management.
Back to Catalog
Experimental environment
- MacOS Native
- MacOS under Parallels Desktop virtual machine (network source is set to shared network mode):
- Kali Linux-64bit (attack aircraft, IP
10.211.55.10
)
- Windows 7-64bit (target drone, IP as
10.211.55.14
)
- Windows XP Professional Version 2002 Service Pack 3 (target drone, IP is
10.211.55.16
)
Back to Catalog
Basic question Answer
What is a form
The browser can parse what language to run.
What dynamic languages are supported by webserver
Back to Catalog
Pre-knowledge
- Web Front End
- Programming Speech: Html/css/javascript (JS)
- Operating Environment: Browser
- Programming use: Dynamic inside the browser, beautiful display form
- Web Back-end
- Programming Language: Php/jsp/.net ...
- Operating Environment: Application Server/Middleware
- Programmatic use: processing the data submitted by the front end and returning the appropriate HTML page content
- Database programming
- Programming language: php/jsp/. NET corresponding libraries, SQL language
- Operating Environment: Database server
- Programming use: Basic data increase, delete, change, check
Introductory learning process:
- WebServer:
- First, master the basic operation of Apache, installation, start-stop
- Configuration modifications (such as listening ports)
- Front-end Programming:
- Familiar with Html+javascript.
- Understanding the concept of forms
- Write different HTML pages, put them into the Apache working directory, and access them from the browser.
- Back-end Programming:
- Understand the different Get/post methods
- Try to use the Get/post method to transfer the user input in the browser, and in the background with PHP read parameters, according to the different parameters, to return different content to the browser.
- Database programming
- MySQL installation, start-stop
- MySQL Client Login
- Practice basic SQL operations in the MySQL client: Build a database, build a table, add data, delete, change, check
- Call the MySQL library in PHP for the appropriate database operation
Back to Catalog
Experimental steps
1 Apache Installation and configuration
Back to Catalog
2 Front-end programming
Back to Catalog
3 Back-end programming PHP installation and configuration
Back to Catalog
4 installation and configuration of MySQL
Back to Catalog
5 Simple SQL injection with XSS
Back to Catalog
Problems encountered in the experiment and solutions to solve the process
Back to Catalog
Experiment Summary and experience
??
Back to Catalog
Resources
- Setoolkit making phishing pages-Jinniu-Blog Park
- Setoolkit Social Engineering Toolkit-CSDN Blog
- A "Devil's training camp" Reading notes: Setoolkit clone website
- DNS spoofing principle and work Engineering analysis-CSDN Blog
- Exploitation with social Engineering Toolkit set-aircrk-Blog Park
- What is DNS spoofing? Demonstrating DNS spoofing attacks
Back to Catalog
2017-2018-2 20155314 "Network countermeasure Technology" EXP8 Web Foundation