Vulnerability checks

Cross-site scripting (XSS) is a type ofcomputer security
vulnerability typically found in Web applications. XSS enables attackers to inject client-side script into Web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypassaccess controls such as the
same origin policy. Cross-site scripting carried out on websites accounted for roughly 84% of all security vulnerabilities documented bySymantec as of 2007.[1]
Their effect may range from a petty nuisance to a significant security risk, depending on the sensitivity of the data handled by the vulnerable site and the nature of any security mitigation implemented by the site‘s owner.

session fixation

In computer network security, session fixation attacks attempt toexploit
the vulnerability of a system which allows one person to fixate (set) another person‘ssession identifier (SID). Most
session fixation attacks are web based, and most rely on session identifiers being accepted fromURLs (query
string
) or POST data.

Bruteforce

A brute force attack can manifest itself in many different ways, but primarily consists in an attacker configuring predetermined values, making requests to a server using those values, and then analyzing the response. For the
sake of efficiency, an attacker may use a dictionary attack (with or without mutations) or a traditional brute-force attack (with given classes of characters e.g.: alphanumerical, special, case (in)sensitive). Considering a given method, number of tries, efficiency
of the system which conducts the attack, and estimated efficiency of the system which is attacked the attacker is able to calculate approximately how long it will take to submit all chosen predetermined values.

SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).[1]
SQL injection must exploit a security vulnerability in an application‘s software, for example, when user input is either incorrectly filtered forstring literal
escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attackvector for websites but can be used to attack any
type of SQL database.

Path traversal

A Path Traversal attack aims to access files and directories that are stored outside the web root folder. By browsing the application, the attacker looks for absolute links to files stored on the web server. By manipulating variables
that reference files with “dot-dot-slash (../)” sequences and its variations, it may be possible to access arbitrary files and directories stored on file system, including application source code, configuration and critical system files, limited by system
operational access control. The attacker uses “../” sequences to move up to root directory, thus permitting navigation through the file system.

This attack can be executed with an external malicious code injected on the path, like theResource Injection
attack. To perform this attack it’s not necessary to use a specific tool; attackers typically use a spider/crawler to detect all URLs available.

This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”.

SSL Login

Most web developers know that if their users enter a username and password to login to a site that isn‘t secured by an SSL certificate, an attacker can see their username and password in plain text. But making a secure login
form isn‘t always as simple as it sounds and many large web sites have done it incorrectly. Though it is often misunderstood, there are good ways and bad ways to secure your website‘s login form with SSL.

What are the risks? If an attacker can easily view someone‘s username and password, he can impersonate that user, and do massive damage by buying products, transferring money, reading email, etc. But there is a far more dangerous
possibility: Because (ahem, unintelligent) users often use the same password on many sites (using the same password for their bank account as their Facebook account), an attacker can potentially compromise many other accounts. If you let people store a password
with you, you must take responsibility for protecting it, even if the security of your own site isn‘t critical (e.g. a forum).

Access to admin Pages

The first possible vulnerability is essentially a configuration issue associated with the Portal Lis-

tener and modplsql. When these are installed, the default configuration allows all users access to

the Listener and modplsql administration pages.

A second potential vulnerability may occur if customers grant public access to PL/SQL proce-

dures, in particular those which access an Oracle database such as OWA, SYS and DBMS. Since

publicly accessible procedures may be accessed through a URL, it may be possible to invoke

these procedures through a URL and cause SQL statements to be executed on a back-end Oracle

database

URL  Redirection

URL redirection, also called
URL forwarding
, is a World Wide Web technique for making a web page available under more than one URL address. When a web browser attempts to open a URL that has been redirected, a page with a different URL is opened. Similarly,domain redirection or
domain forwarding is when all pages in a URLdomain are redirected to a different domain, as when
wikipedia.com and wikipedia.net are automatically redirected to wikipedia.org. URL redirection can be used for URL shortening, to prevent broken links when web pages are moved, to allow multiple domain names belonging to the same owner to refer to a singleweb site, to guide navigation into and
out of a website, for privacy protection, and for less innocuous purposes such asphishing attacks.

Session Exposed in URL

For example, an airline website might use the following URL: http://example.com/sale/saleitems?jsessionid=2P0OC2JSNDLPSKHCJUN2JV. Users may wish to share information about the sale on that page with their friends, so they email
them the link. When the friends follow the link they are unknowingly gaining access to the entire authenticated session, complete with credit card info. solutionNever put the session ID in a URL. Use POST rather than GET.

时间: 2024-11-05 11:35:58

Vulnerability checks的相关文章

黑客工具软件大全100套

黑客工具软件大全100套  ゴリラ大統領 2011-05-21 16:55:58 #1 Nessus:最好的UNIX漏洞扫描工具 Nessus 是最好的免费网络漏洞扫描器,它可以运行于几乎所有的UNIX平台之上.它不止永久升级,还免费提供多达11000种插件(但需要注册并接受EULA-acceptance--终端用户授权协议).它的主要功能是远程或本地(已授权的)安全检查,客户端/服务器架构,GTK(Linux下的一种图形界面)图形界面,内置脚本语言编译器,可以用其编写自定义插件,或用来阅读别人

【转载】扫描渗透等工具介绍

#1 Nessus:最好的UNIX漏洞扫描工具 Nessus 是最好的免费网络漏洞扫描器,它可以运行于几乎所有的UNIX平台之上.它不止永久升级,还免费提供多达11000种插件(但需要注册并接受EULA-acceptance--终端用户授权协议).它的主要功能是远程或本地(已授权的)安全检查,客户端/服务器架构,GTK(Linux下的一种图形界面)图形界面,内置脚本语言编译器,可以用其编写自定义插件,或用来阅读别人写的插件.Nessus 3 已经开发完成(now closed source),其

扫描渗透等工具介绍

#1 Nessus:最好的UNIX漏洞扫描工具 Nessus 是最好的免费网络漏洞扫描器,它可以运行于几乎所有的UNIX平台之上.它不止永久升级,还免费提供多达11000种插件(但需要注册并接受EULA-acceptance--终端用户授权协议).它的主要功能是远程或本地(已授权的)安全检查,客户端/服务器架构,GTK(Linux下的一种图形界面)图形界面,内置脚本语言编译器,可以用其编写自定义插件,或用来阅读别人写的插件.Nessus 3 已经开发完成(now closed source),其

mysql调优工具

下载地址: https://raw.githubusercontent.com/major/MySQLTuner-perl/master/mysqltuner.pl 直接使用 wget https://raw.githubusercontent.com/major/MySQLTuner-perl/master/mysqltuner.pl 下载即可. chmod +x mysqltuner.pl ./mysqltuner.pl 然后输入用户名和密码即可. 下图是我一台线上服务器的检测结果. 浏览输

Linux Overflow Vulnerability General Hardened Defense Technology

Catalog 1. Grsecurity/PaX 2. Hardened toolchain 3. Default addition of the Stack Smashing Protector (SSP): Compiler Flag: GS 4. Automatic generation of Position Independent Executables (PIEs): System Characteristic + Compiler Flag: ASLR 5. Default to

SEED Labs – Race Condition Vulnerability Lab

SEED Labs – Race Condition Vulnerability Lab 1Race Condition Vulnerability LabCopyright 2006 - 2016 Wenliang Du, Syracuse University.The development of this document was partially funded by the National Science Foundation under AwardNo. 1303306 and 1

Android linux kernel privilege escalation vulnerability and exploit (CVE-2014-4322)

In this blog post we'll go over a Linux kernel privilege escalation vulnerability I discovered which enables arbitrary code execution within the kernel. The vulnerability affected all devices based on Qualcomm chipsets (that is, based on the "msm&quo

Open Wifi SSID Broadcast vulnerability

Open Wifi SSID Broadcast vulnerability 0x00 前言 前几天,看到微博上@RAyH4c分享了一份老外关于wifi钓鱼的文章,觉得挺好的,便翻译了一下.第一次翻译,英语水平堪堪才过4级,翻的不好请大家见谅,凑合着看吧. 附上原文地址:https://www.os3.nl/_media/2012-2013/courses/ssn/open_wifi_ssid_broadcast_vulnerability.pdf 0x01 摘要 一些厂商更想传递更好的用户体验

[Immutable.js] Lightning Fast Immutable.js Equality Checks with Hash Codes

While Immutable.js offers .is() to confirm value equality between iterables it comes at the cost of referencing each key and value in both objects. For lightning fast equality checks, Immutable.js can produce a hash code based on an iterable's conten