Troy Hunt's analysis data comes from a simple website scanning Service developed by him, ASafaWeb, and automatic Security Analyser for ASP. NET Websites. As long as users provide URLs for ASP. NET websites published on the Internet, ASafaWeb sends several requests to check whether the website has some common security vulnerabilities.
From the website records scanned from 7,184 to this year, a total of test results were excluded from the ASafaWeb test site and non-ASP. NET website. Hunt made simple statistics. Although I think this result may not reflect the actual situation accurately due to the fact that the user actively provides the website for detection, or even cannot exclude the fact that the user will deliberately create a problem situation to test the ASafaWeb check effect, however, it is of great reference value and worth our attention to ASP.. NET. The following are common ASP. NET configuration Security Vulnerabilities listed by Hunt:
Link: http://www.cnblogs.com/shanyou/archive/2012/09/02/2668022.html
Edit recommendations]
- Design and Development of ASP. NET online File Management Module
- ASP. NET application and page Lifecycle
- Independent governance: ASP. NET team Division
- ASP. net mvc involves five synchronous and asynchronous
- Summary of ASP. NET Cache