• Penetration Test


    Application Exploits, Part III

    CROSS-SITE SCRIPTING(XSS)
    • Injection attack in which an attacker sends malicious code(client-side script) to a web application that a subsequent client runs
      • Stored/persistent
        • Attack data(script) stored discretely on the server
      • Reflected
        • Non-persistent attack in which attack code is sent to another client
      • DOM(Document Object Model)
        • XSS attack that uses XML, not HTML, to transport attack code
    CROSS-SITE REQUEST FORGERY(CSRF/XSRF)
    • Similar to XSS; occurs within an authenticated session
    • XSRF attacks a user
    • Attacker can cause authorized user to take some action by clicking a link
    CLICKJACKING
    • Tricking user into clicking a different link or object that was intended
    • Attackers can use transparent or opaque layers to embed attack links
    SECURITY MISCONFIGURATION
    • Directory traversal
      • Allows users to navigate outside a web server's root directory
    • Cookie manipulation
      • Access to cookies can allow an attacker to change the way in which a web application operates in general, or just for a specific user/session
    FILE INCLUSION
    • Related to directory traversal
    • Attacker is allowed to build path to .exe file or a file to access
    • File can be local or remote
    QUICK REVIEW
    • XSS is an injection attack on a server using scripting code and has three types: stored/persistent, reflective, or DOM
    • XSRF/CSRF attacks the user and occurs within an authenticated session
    • XSS and XSRF both use client/server interaction to launch attacks based on specially crafted links or scripts
    • Passive attacks exploits security misconfigurations (e.g directory traversal, cookie manipulation, and file inclusion)
    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    mybatis05--多条件的查询
    mybatis04--Mapper动态代理实现
    mybatis03--字段名和属性名不一致
    mybatis02--增删改查
    myBatis01
    hibernate12--缓存
    hibernate11--Criteria查询
    hibernate10--命名查询
    hibernate09--连接查询
    (转载)閱讀他人的程式碼(5)找到程式入口,再由上而下抽絲剝繭
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/13782666.html
Copyright © 2020-2023  润新知