zoukankan      html  css  js  c++  java
  • Penetration Test

    Application Exploits, Part I

    APPLICATION-BASED EXPLOITS
    • Injection attack
      • Inserting additional data into application beyond what is expected
      • SQL (Structured Query Language)
        • Adding specially crafted SQL input to extract/modify data or execute commands
      • HTML
        • Adding HTML code/submitting data to change how a page works or the data is handled
    INJECTIONS, cont'd
    • Command
      • Adding command line options that change the way commands operate
    • Code
      • A generalization of SQL injection - adding code in any language to change a program's behavior
    QUICK REVIEW
    • Injection attacks provide specially crafted input to applications.
    • Injection attacks depend on an application's failure to properly validate input data
    • Results can include crashing a service or making it unresponsive
    • Some injection attacks can provide privilege escalation
    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    THD 变量存入threads中
    一个简单的optimizer_trace示例
    LINUX HOOK
    网易杭研后台技术中心的博客
    INNOSQL.官网
    淘宝 印风 UDF
    mysql原创博客
    mysql 主从图
    THD
    开源利器函数调用图
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/13697808.html
Copyright © 2011-2022 走看看