. July 8, the owasp Asia Summit held in Shenzhen, 2017 is the first year of the official implementation of the cyber Security Law in China and the first year of the "cyber-space security strategy". This summit, with the theme of "safe and orderly construction of the global global Village", invited many top security leaders and senior security experts at home and abroad to discuss in depth "building and maintaining the fairness and justice of cyberspac
|asa| ....Add upload shell.cer, or casing bypass, shell. Asp/shell.php ....3. Suffix name Resolution vulnerabilityIis6.0/apache/nginx (PHP-FPM)Common shell.asp;. Jpg,/shell.asp/shell.jpg,shell.php.xxx (Apache parse from right to left, unrecognized, skip to next parse)4.0x00 truncationUpload shell.php.jpg=>burpsuite interception, after. php with a space, in hexadecimal, the corresponding 0x20 modified to 0x00 (empty), the program when processing this file name, directly discard the following. jpg
to run or run on demand.Multiple systems with OpenVAS installed can be controlled by a single master, making it an extensible Enterprise vulnerability assessment tool. The project's compatible standards allow it to store scan results and configurations in SQL database so that they can be easily accessed by external reporting tools. The client tool accesses the OpenVAS manager through an XML-based stateless OpenVAS management protocol, so security administrators can extend the capabilities of th
Recently read an old article, see WebScarab This tool, to see compiled good https://sourceforge.net/projects/owasp/files/WebScarab/, the earliest is 07 years, so decided to recompile.1. Download and configure the ant environment2. Download Owasp-webscarab on GitHub3, ant build Error (\webscarab\util\htmlencoder.java file comments have GBK encoding), open the file delete these dozens of comments, rerun the a
OWASP Juice Shop v6.4.1 part of the answer
OWASP Juice Shop is a range environment designed for safety skills training.
After the installation is complete the interface:
Score BoardThe problem is to find a hidden scoring interface, which can be detected by viewing the source code of the Web page.After you open the page
Admin sectionerror HandlingVisit the Store Management section.
The authoritative security organization Owasp has just updated top 10:https://www.owasp.org/index.php/top_10_2013-top_10 ten security vulnerabilities: 1. injection, including SQL, operating system, and LDAP injection. 2. Problematic identification of session management. 3. Cross-site scripting attacks (XSS). 4. Unsafe direct object references. 5. Security Configuration error. 6. Exposing sensitive data. 7. Function-level access control is missing. 8.
The Fuzzer available scenarios for the Owasp Zap Security Audit tool are as follows:One, SQL injection and XSS attacks, etc.1. Select the field value to check in the request, right click-fuzzy2. Select the file Fuzzer function (including SQL injection, XSS attack, etc.) to check the related security issues.3, the following is the results of SQL injection inspection, you can see the name field of SQL injection traversal (XSS, etc.)Second, violent crack
1. Dependency-check can check for known, publicly disclosed vulnerabilities in project dependency packages. Currently good support for Java and. NET; Ruby, node. js, andPython are in the experimental phase, and C + + is supported only through (autoconf and CMake). The owasp2017 Top10 is mainly available for a9-using components with known vulnerabilities. Solution to the problem2, Dependency-check has command line interface, MAVEN plugin, Jenkins plug-ins and so on. The core function is to detect
ArticleDirectory
Verification Code and operation confirmation
Session token
The recent phone interviews have been quite tragic. I am not sure much about what the interviewers are concerned about, it is difficult to leave a strong,
top1-InjectionSimply put, the injection is often caused by an application lacking a secure check of the input, and the attacker sends some data that contains instructions to the interpreter, which translates the received data into instruction
Injection
Injection flaws, such as SQL, OS, and LDAP injection, occur when untrusted data are sent to an interpreter as part of a COM Mand or query. The attacker ' s hostile data can trick the interpreter into executing unintended
1. Security Configuration ErrorSecurity configuration errors can occur at any level of an application stack, including platforms, Web servers, application servers, databases, frameworks, and custom code.Developers and system administrators need to
SummaryHTML injection is a type of injection issue this occurs when a user are able to control an input point and are able to injec T arbitrary (any) HTML code into a vulnerable web page. This vulnerability can has many consequences (consequences),
1. CauseImproper authentication and session management methods.Including logout, password management, timeout mechanism, remembering users, password problems, and account updates.2. HazardsThe account is stolen and attackers can have all the permissions of the account. Privileged accounts are often attacked.3. Discovery(1) An insecure hash or encryption algorithm is used to store passwords.(2) Use the weak account management function to guess or overwrite the user password (Account creation, pas
implementation for URL escaping and reversal semantics
String safe = Esapi.encoder (). Encodeforurl (Request.getparameter ("input"));
Rule # Use a dedicated library to clean out HTML tagsOWASP Antisamy
Import org.owasp.validator.html.*; Policy policy = policy.getinstance (policy_file_location); Antisamy as = new Antisamy (); Cleanresults cr = As.scan (dirtyinput, policy); Myuserdao.storeuserprofile (cr.getcleanhtml ()); Some custom function
Install modsecurity:
sudo apt-get install libxml2 libxml2-dev libxml2-utils libaprutil1 libaprutil1-dev libapache-mod-security
If your Ubuntu is 64bit, you need to fix a bug:
sudo ln -s /usr/lib/x86_64-linux-gnu/libxml2.so.2/usr/lib/libxml2.so.2
Configure modsecurity:
sudo mv /etc/modsecurity/modsecurity.conf-recommended/etc/modsecurity/modsecurity.conf;sudo vi/etc/modsecurity/modsecurity.conf
Enable the rule engine:
Se
The links listed below are online documents, and enthusiasts who are interested in information security can serve as an introductory guide.
Background knowledge
General knowledge
Sun Certified-solaris 910 Security Administrator Learning Guide
PICOCTF Information
Application software Security
Code specification for owasp security Code
Vulnerability Mining
Windows ISV Software Security Defense
Mobile Security
OWASP
/hacking-tools/vulnerability-exploitation-tools/Forensics: MaltegoMaltego is different from other forensics tools because it works within the scope of digital forensics. Maltego is designed to pass a comprehensive network threat picture to the local environment of the enterprise or other forensic organization, which is a platform. Maltego is great, and it's very popular (because it's the top ten in Kali) because of its unique perspective because it provides both an entity-based network and a sou
great, and it's very popular (because it's the top ten in Kali) because of its unique perspective because it provides both an entity-based network and a source that aggregates the entire network of information-whether it's the current configuration of the network's fragile routes or the current international access of your employees, Maltego can locate, summarize and visualize the data! Small series of suggestions are interested students also learn OSINT network security data.Maltego Learning M
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.