1, Webshell Backdoor
Webshell is a kind of command execution environment which exists in the form of ASP, PHP, JSP or CGI, or it can be called as a kind of web backdoor. After hacking into a web site, hackers typically use these ASP or PHP backdoor files with the Web server
Web directory under the normal Web files mixed together, and then you can use the browser to access these ASP or PHP back door, get a command execution environment to control the purpose of the Web server (can upload download files, view the database, execute any program
command, etc.)
In other words, Webshell is a "normal" script file (which says it is normal, from the point of view of text), while Webshell's malice is manifested in its implementation function, also called back Door, is a malicious purpose of the normal script code (mareware )
2. SQL Injection
With the development of B/s pattern application development, more and more programmers use this model to write applications. However, due to the varying levels and experience of programmers, a large number of programmers write code without judging the legality of user input data, which makes the application a security risk. The user can submit a database query code, according to the results returned by the program, to obtain some of the data he wants to know, this is called SQL injection, that is, SQL injection.
3, Caidao Webshell
Kitchen knife Webshell
4. Backup File Attack
Backup files for attacks
5, Information Leak Attak
Information breach attack
6. Command Injection Attack
Command injection attack
7. XSS Attack
Cross-site scripting attacks
8. DDos Attack
Distributed denial of service (ddos:distributed denial of services) attack refers to the use of client/server technology to unite multiple computers as an attack platform to launch a DDoS attack on one or more targets, thereby multiplying the power of a denial of service attack. Typically, an attacker would use a theft account to install a DDoS master program on a computer, where a set time master will communicate with a large number of agents, and the agent is already installed on many computers on the network. An agent launches an attack when it receives an instruction. With client/server technology, the master program can activate hundreds of agents within seconds.
In fact, eight claw fish Bidding network every day is facing the above various attacks, so want to do a good bidding site, but also a free bidding site is a very difficult thing.
Popular ways to attack websites