Tip: After the article is finished, the directory can be automatically generated. How to generate it can refer to the help document on the right
Article Directory
- Operating system level
- Briefly describe the difference between the two and the significance of identification
- Corresponding significance of vulnerability types at the operating system level
- Database level
- Third-party level
Operating system level
- Common ways to identify operating systems
Websites through websites or scan tools have no impact on uppercase and uppercase cases, and are generally judged as Windows system - You can also use TTL to determine the operating system category
- Available
nmap -o ip
Address to determine the operating system
Briefly describe the difference between the two and the significance of identification
- The applicability of network path, upper case, and file type between two systems. When determining which operating system is, starts from the vulnerability supported by the operating system.
Corresponding significance of vulnerability types at the operating system level
-
SQL injection vulnerability
It is a security vulnerability that occurs at the database level. It is widely used to illegally obtain control of the website. It ignores the check of the input characters with SQL statements and is executed as a normal SQL command, resulting in the database being attacked, the database is added, deleted, modified and checked, and the backdoor loading. -
Cross-site scripting vulnerability
xss occurs on the client, used to obtain private information, phish websites, and spread malicious attack code. Although xss is not harmful to the server, it can use the website to spread it, which can cause user information under the server to leak. This leads to the stolen website user accounts, which also causes serious harm to the website. -
Weak password loophole
It is easy to be recognized by others. Weak passwords (weak passwords) do not have strict and accurate definitions. The passwords that are guessed or cracked by cracking tools are all weak passwords. Setting up a password usually follows the following principles: -
HTTP header tracking vulnerability
It is mainly used by the client to test or obtain diagnostic information by submitting a TRACE request to the web server. When TRACE is enabled on the web server, the submitted request header will be returned in the content of the server response (Body), where the HTTP header is likely to include Session Tokens, Cookies, or other authentication information. Attackers can exploit this vulnerability to trick legitimate users and get their private information. This vulnerability is often used in cooperation with other methods to effectively attack. Since HTTP TRACE requests can be initiated through client browser scripts (such as XMLHttpRequest) and can be accessed through the DOM interface, it is easily exploited by attackers. -
File upload vulnerability
The file upload vulnerability is mainly caused by the lack of strict filtering of file path variables. If the file upload function implementation code does not strictly limit the file suffix and file type uploaded by users, the attacker can upload any file, including the website backdoor file (webshell) through the directory accessed by the web, and then remotely control the website server. Therefore, during the development of websites and applications, uploaded files need to be strictly restricted and verified, and uploaded malicious code files are prohibited. At the same time, restrict the execution permissions of related directories to prevent webshell attacks.
Database level
Common methods for identifying database types (1) Database classification
Small Database Access
Medium Database MySQL
Large database Oracle, SQL Server
- 1
- 2
- 3
- 4
- 5
- 6
- Identification through website and operating system
ASP+Access,sql server (windows)
PHP+Mysql(linux, windows) Port: 3306
ASPX+Mssql(windows) Port: 1433
Jsp+Mssql (windows), oracle (linux, windows) port: 1521
- 1
- 2
Notice:
Access and mssql do not support linux operating systems
-
Use nmap tool to scan to view port openness
sql server-------------------------------------------------------------------------------------------------------------------------- Mysql--------------------------------------------------------------------------------------------------------------------------- Oracle------------------------------------------------------------------------------------------------------------------------------ Mongodb---------------------------------------------------------------------------------------------------------------------------
- 1
- 2
- 3
- 4
- 5
-
Database TypeDifference and identification significance
The security mechanism and internal structure of each database are slightly different, and the vulnerabilities that are generated are also different. Different databases have different attack methods, vulnerability types and impacts.
-
Common vulnerabilities and attacks in databases
Weak password attack: log in to the database through weak password, get the website administrator data information, log in to the website background, and make modifications
-
Briefly describe the scope of impact of vulnerabilities at the database level
Through vulnerabilities, attacks can also obtain relevant permissions of the database and perform a series of operations
Third-party level
Common third partiessoftware:
Jboss, PHPmyadmin, vsftpd, teamview, etc.
- If the website cannot be explored, then perform a port scan
For example, the judgment of phpmyadmin - Scan the directory of the website to determine if the website cannot detect it, then scan it through the port. Multi-level judgments cannot be limited to port scanning, and different methods should be adopted according to different applications.
- If nmap cannot be scanned, it may be intercepted by third-party protection software (safety dog) or other methods. It is also possible that the other party’s services are deployed on the intranet.