1. Vulnerability Acquisition Method
1) Scanner scan 2) Dark cloud 3) online Service vulnerability
Examples:
on-line crm-> administrator weak password, background upload picture vulnerability, upload php file, enter the intranet--scan intranet topology, get various shared files
2. Causes of intrusion
1) Fun 2) Drag the library, the purpose, to obtain a variety of account password. The same account may be password in other places.
3) Delete article, Hang black chain, unfair competition attack
3. Common Vulnerabilities
1) SQL injection 2) XSS
4. Some methods of obtaining vulnerabilities
1) Scanner scan 2) Dark cloud View
3) Manufacturing page error, such as the number of arguments plus, the page error will show some sensitive information, gradually change the parameters to see the change in information
4) Payment security, no money to buy, 1 cents to buy 10 copies, etc.
the server-side data update is incorrect by altering the number of packets submitted by the local page, for example, the deduction is negative.
deduct less than the actual value, the quantity is more than the actual value, etc.
Web Security Training Notes