How do I know if your website has any vulnerabilities? Recently, many websites have suffered various forms of attacks. The motivations for hacker attacks are different, and the target of hacker attacks is also uncertain, as a corporate network administrator or CEO, are you worried that your website will suffer the same fate?
What types of websites are prone to hacker intrusion?
Some people say that I am a person with a low profile and cannot offend people. Naturally, no one has hacked me. In fact, even if you don't have a competitor who hires you, there will also be curious or technical boring hackers who want to intrude into your site to find out.
Therefore, what types of websites are easy to be hacked. Websites with vulnerabilities are not bad websites.
Whether your website is a dynamic website, such as an asp, php, jsp, or static website, there is a possibility of intrusion.
Is your website vulnerable? How do I know if your website has any vulnerabilities?
Common hackers intrude almost of websites by uploading vulnerabilities, violent libraries, injections, and side-by-side injection. Of course, there are more advanced intrusions. Some hackers have been following up on a website for several months to find an intrusion point. Let's take a look at these websites that are easily hacked.
1. Upload Vulnerability
This vulnerability was the most widely used by hackers in the DVBBS6.0 era. Using the Upload Vulnerability, you can directly obtain WEBSHELL, which has a high level of threat. The current upload vulnerability is also a common vulnerability.
Vulnerability description:
Add/upfile to the address bar of the website. if asp displays an incorrect upload format [re-upload], there is an upload vulnerability. Find a tool that can be uploaded to obtain WEBSHELL.
Tool introduction:
The upload tool, Veteran's upload tool, and DOMAIN3.5 can both be used for upload, and can be submitted using NC.
Experts' questions:
What is WEBSHELL? Many people do not understand this. Here we will give you a simple explanation. In fact, WEBSHELL is not an esoteric thing. It is a WEB permission that allows you to manage the WEB, modify the homepage content, and other permissions, however, you do not have any special permissions. (This depends on the Administrator's settings.) This permission is generally required to modify others' homepages, friends who have been familiar with WEB Trojans may know (for example, the webmaster assistant of veterans is the WEB Trojan, Haiyang 2006 is also a WEB Trojan) that we uploaded the vulnerability and finally passed it on, sometimes a server with poor permission settings can obtain the highest permission through WEBSHELL.
Expert reminder:
Most website programs are modified on the basis of public programs, and there will always be vulnerabilities in the programs. Smart website administrators should learn to master the above tools and pay attention to the latest vulnerabilities in their web programs. Use the above tools for self-detection to ensure website security.
2. brute-force database:
Many websites can exploit this vulnerability. Very dangerous!
A brute-force database is used to submit a character to obtain the database file. After obtaining the database file, the hacker has the front-end or back-end permissions of the site. For example, the address of a site is http: // www.bkjia.com/dispbbs.asp? BoardID = 7 & ID = 161, hackers can replace/in the middle of com/dispbbs with % 5c. If a vulnerability exists, they can directly obtain the absolute path of the database, download it with thunder or something. Another way is to use the default database path http: // www.bkjia.com/and then add conn.asp. If the default database path is not modified, you can obtain the path of the database (Note: replace/with % 5c here ).
Experts' questions:
Why cannot I change to % 5c? Because/is equal to % 5c in the ASCII code, why cannot I find the database name/# abc. mdb? Here, you need to replace # With % 23 to download the file. Why is my database file exposed. End with ASP? What should I do? Here, you can replace. ASP with. MDB during the download so that you can download it. If the download is not available, it may prevent the download.
Expert reminder:
Databases are always what hackers are most interested in. Database Security is not fully considered by every programmer during programming. After going online, you should find a professional security company to test database penetration testing to ensure database security.
3. injection vulnerability:
This vulnerability is currently the most widely used and highly lethal. It can be said that Microsoft's official website also has an injection vulnerability.
Vulnerability description:
The injection vulnerability is caused by the absence of strict character filtering. You can obtain related information such as the administrator's account and password.
Experts' questions:
I will first introduce how to find a vulnerability, such as the website http: // www.xxx.com/dispbbs.asp? BoardID = 7 & ID = 161 is followed by a station ending in ID = number. We can manually add and 1 = 1 to the back of the station to see if a normal page is displayed, and 1 = 2 is added. check whether there are no vulnerabilities on the normal page. If an error is returned, the injection vulnerability exists. If the "and 1 = 1" error page is returned, no vulnerability exists. If you know whether the site has any vulnerability, you can use it.
Tool introduction:
You can manually guess the password, or you can use many tools (such as nbsi ndsi and d domain) to guess the account password. It is recommended that you use a tool, which is cumbersome. Experts remind: Websites of large companies should be conducted by senior programmers who understand security programming. After development and launch, professional companies should be invited to perform security testing. To ensure program security and reliability!
4. Side note:
When we intrude into a station, this station may be robust and impeccable. We can find a site with the same server as this station, and then use this Site for Elevation of Privilege, sniffing and other methods to intrude into the site we want to intrude. In an image metaphor, for example, if you and I are neighbors, my house is safe, but your house is easy to steal. Now there is a thief who wants to intrude into my house. He has inspected and stepped into my house and found it difficult to enter my house. Then the thief found that your house and my house are neighbors, you can easily enter your home. He can first enter your home, and then enter your home through your balcony.