码迷,mamicode.com
首页 > Web开发 > 详细

Penetration Test - Select Your Attacks(10)

时间:2020-10-09 20:20:18      阅读:34      评论:0      收藏:0      [点我收藏+]

标签:pass   ica   crete   user   roo   pes   authorize   file   review   

Application Exploits, Part III

CROSS-SITE SCRIPTING(XSS)
  • Injection attack in which an attacker sends malicious code(client-side script) to a web application that a subsequent client runs
    • Stored/persistent
      • Attack data(script) stored discretely on the server
    • Reflected
      • Non-persistent attack in which attack code is sent to another client
    • DOM(Document Object Model)
      • XSS attack that uses XML, not HTML, to transport attack code
CROSS-SITE REQUEST FORGERY(CSRF/XSRF)
  • Similar to XSS; occurs within an authenticated session
  • XSRF attacks a user
  • Attacker can cause authorized user to take some action by clicking a link
CLICKJACKING
  • Tricking user into clicking a different link or object that was intended
  • Attackers can use transparent or opaque layers to embed attack links
SECURITY MISCONFIGURATION
  • Directory traversal
    • Allows users to navigate outside a web server‘s root directory
  • Cookie manipulation
    • Access to cookies can allow an attacker to change the way in which a web application operates in general, or just for a specific user/session
FILE INCLUSION
  • Related to directory traversal
  • Attacker is allowed to build path to .exe file or a file to access
  • File can be local or remote
QUICK REVIEW
  • XSS is an injection attack on a server using scripting code and has three types: stored/persistent, reflective, or DOM
  • XSRF/CSRF attacks the user and occurs within an authenticated session
  • XSS and XSRF both use client/server interaction to launch attacks based on specially crafted links or scripts
  • Passive attacks exploits security misconfigurations (e.g directory traversal, cookie manipulation, and file inclusion)

Penetration Test - Select Your Attacks(10)

标签:pass   ica   crete   user   roo   pes   authorize   file   review   

原文地址:https://www.cnblogs.com/keepmoving1113/p/13782666.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!