HTTP Knowledge Popularization series: Web Attack technology

Source: Internet
Author: User
Tags session id

  1. There is no security issue in the HTTP protocol itself, and resources such as servers and clients that apply the HTTP protocol and Web applications running on the server are the targets of the attack.
  2. Web sites make almost all of the security features of Session management, encryption processing, and so on. The HTTP protocol itself does not have these features.
  3. Loading the attack code within the HTTP request message can initiate an attack on the Web application.
  4. Web-based attack mode
    1. An active attack is an attack pattern in which an attacker enters an attack code by directly accessing the application.
    2. A passive attack is an attack pattern that executes an attack code using a full set of policies.
  5. Implementing a Web application's security policy can be broadly divided into the following two parts.
    1. Client Authentication
    2. Web application side (server side) validation
      1. Input value Validation
      2. Output value escape
  6. A cross-site scripting attack is an attack that runs illegal HTML-tagged live JavaScript through a Web site that has a security vulnerability that registers a user's browser.
    1. Using false input forms to defraud users of personal information
    2. Use a script to steal a user's cookie value and be shouted to help an attacker send a request without knowing it.
    3. Displays a forged article or picture.
  7. SQL injection refers to the database that is used by the Web app, and attacks that are generated by running illegal SQL.
    1. Illegally viewing or tampering with data in a database
    2. Bypass Certification
    3. Execute the program associated with the database server business, etc.
  8. An OS command injection attack is a means of executing an illegal operating system command through a Web application to achieve an attack.
  9. An HTTP header injection attack is an attack in which an attacker adds an arbitrary response header or subject by inserting a newline within the response header field.
  10. Message header injection refers to the message-sending feature in a web app that an attacker initiates by adding any illegal content to the message header to or subject.
  11. A directory traversal attack is an attack on a file directory that is not intended to be exposed, which is accessed through an illegal truncation of its directory path.
  12. A remote file containment vulnerability is an attack that allows an attacker to run arbitrary scripts after a file has been read by a specified external server's URL when a portion of the script's content needs to be read from another file.
  13. Forced browsing security breaches refer to files that are otherwise not voluntarily disclosed, from files placed in the public directory of the Web server.
  14. An incorrect error message handling security vulnerability is a Web application that contains information that is useful to an attacker in the error message.
  15. Open redirection refers to a jump function that redirects any URL.
  16. Session hijacking means that an attacker gets the user's session ID by some means and illegally uses the session ID to disguise the user's intent to reach the attack.
  17. For a session hijacking that steals the target session ID as an active attack, a session pinning attack forces the user to use the session ID specified by the attacker, which is a passive attack.
  18. Cross-site request forgery attack is a passive attack in which an attacker enforces certain status updates, such as unexpected personal information or setting information, to a user who has completed authentication by setting a good trap.
  19. Password cracking attack is to calculate the password, breakthrough authentication.
    1. Pass the password on the network trial and error
      1. Poor Lifting method
      2. Dictionary attacks
    2. The decryption of the encrypted password
  20. Click Hijacking refers to the use of transparent buttons or links as traps, covering the Web page.
  21. A Dos attack is an attack that keeps a running service in a stopped state. DDoS refers to Dos attacks initiated by multiple computers.
  22. A backdoor is a hidden portal for development settings, which does not use the restricted function as normal steps.

HTTP Knowledge Popularization series: Web Attack technology

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.