Use ASP. NET's built-in functions to defend against Web Attacks
Release date: 4/28/2005
| Updated on: 4/28/2005
Dino espositoWintellect
ApplicableMicrosoft ASP. NET 1.X Microsoft ASP. Network 2.0
Abstract:Dino summarizes the most common
SQL Injection tianshu-Asp Injection Vulnerabilities Author: Nb Alliance-Xiaozhu (QQ: 48814) Introduction With the development of the B/S mode application, this mode is used to write the applicationProgramMore and more programmers. However, due
With the development of the B/S mode application, this mode is used to write the application
Program More and more programmers. However, the entry threshold for this industry is not high, and the programmer's level and experience are also
With the development of B/S application development, more and more programmers are writing applications using this mode. However, due to the low entry threshold in this industry, the programmer's level and experience are also uneven. A considerable
Transfer to hacker XFile
With the development of B/S application development, more and more programmers are writing applications using this mode. However, the entry point of this industry
The threshold is not high, and the programmer's level and
Read Catalogue
Viewing the Web. config file
To create a Web site in IIS
IIS6 Add extension mappings
IIS6 map with no extension
Write permissions for the directory
Configuration of SQL Server
Deploying an ASP. NET
In the previous talk, we have learned the basic content of ASP, flexible use of this knowledge, you can use ASP to build a Web site. But in general, a real, the complete site is inseparable from the database, because a small amount of data, such as
Viewing the Web. config fileAsp. NET Web site is different from a typical desktop program, which is not copied to run (except for database connections). To run it, you usually need some configuration procedures.But what exactly do we need to
Asp:
First of all, ASP, which is a scripting language, is a general connected database for access and MSSQL (SQL Server). When we develop a general small database site, generally in 30,000 records below, generally use Access database.
The advantage
1) PrefaceIi) Hazards of SQL Injection3) write and inject vulnerabilities by yourself4) use the popular Injection Method5) practical injection drills6) repair and endI :)Today, various portal forums use dynamic languages such as php asp. NET, as
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.