XSS



XSS有三类:
- 存储型




过程:


-
反射型
过程如下:

-
DOM型
错误信息在hash中
总结:
CSRF漏洞







点击劫持
通过覆盖不可见的框架舞蹈受害者点击而造成攻击的行为。
前置知识




实例

但是实际上有iframe隐藏在图后

如果精心设计通关按钮的话,会让你损失惨重。


URL跳转漏洞
视觉上混淆正规和恶意网站





URL跳转的实现方式
-
header头跳转
- Js跳转

-
META标签跳转
SQL注入漏洞(服务端安全漏洞)
SQL注入的本质是数据和代码未分离,就是说数据当做了代码来执行。


这就是SQL注入

原理如下:
-
正常登陆的时候:
-
使用万能密码登录的时候:
加了闭合单引号 和 注释符,把后面的password给注释掉了
所谓万能密码就是SQL注入的一种利用方式:



利用和危害
-
利用

-
危害
命令注入


DOS命令
- ipconfig 查看网络
- net user 查看系统用户
- dir "./" 查看当前目录
-
复合命令 诸如 echo hello & echo world
echo hello & echo world

命令注入的演示










在构造的时候要转义,比如&
转成%26

网友评论