当前位置:网站首页>[white hat talks about web security] Chapter 1 my security world view
[white hat talks about web security] Chapter 1 my security world view
2022-07-24 10:56:00 【Genius】
List of articles
1.1 Web Brief history of safety
1. A brief history of Chinese hackers
The age of enlightenment : Due to personal interests and hobbies and the influence of foreign hacker technology .
The golden age : Attacks for profit began to appear , The black industrial chain is gradually taking shape .
The age of darkness : Superior bad discard .
2.SQL Inject and XSS( Cross-site scripting attacks ) The appearance of is Web Two milestones in the history of security .
SQL Inject : finger web The application does not judge or filter the validity of the user's input data , Attackers can web Add extra... At the end of a predefined query statement in the application SQL sentence , Implement illegal operation without the administrator's knowledge , In this way, the database server is cheated to execute any unauthorized query , So we can get the corresponding data information .
3. The essence of security problem is the problem of trust .
1.5 Three elements of safety
CIA: Confidentiality (Confidentiality)、 integrity (Integrity)、 Usability (Availability).
Confidentiality It is required to protect data content from leakage , Encryption is a common means of achieving confidentiality requirements .
integrity It is required to protect whether the data content is complete 、 Not tampered with , The common technical means to ensure consistency is digital signature .
Usability The requirement to protect resources is “ On demand ”.
Example : Suppose a parking lot has 100 A parking space , Under normal circumstances, it can stop 100 Vehicles , One day a bad man moved 100 A big stone occupied all the parking spaces , Then the parking lot can no longer provide normal services . In the field of security, it is called Denial of service attacks , abbreviation DoS(Denial of Service). Denial of service attacks destroy the availability of security .
1.6 How to implement safety assessment
1. A safety assessment process , It can be simply divided into 4 Stages : Asset classification 、 Threat analysis 、 risk analysis 、 Confirm the solution .
Asset grading is the key to all work Basics , This work can help us clarify our goals , What to protect , In the field of security , We call the possible source of harm threat (Threat), The possible loss is called risk (Risk), Vulnerabilities refer to places in the system that may be threatened and exploited to cause harm .
2.STRIDE Model ( Threat modeling methods )
| threat | Definition | Corresponding security attributes |
|---|---|---|
| Spoofing( camouflage ) | Pretend to be someone else | authentication |
| Tampering( Tampering ) | Modify data or code | integrity |
| Repudiation( Deny ) | Deny what you have done | Non repudiation |
| InformationDisclosure( Information disclosure ) | Disclosure of confidential information | Confidentiality |
| Denial of Service( Denial of service ) | Denial of service | Usability |
| Elevation of Privilege( Increase authority ) | Unauthorized License | to grant authorization |
3.DREAD Model ( risk analysis )
| Grade | high (3) | in (2) | low (1) |
|---|---|---|---|
| Damage Potential | Get full authentication permission ; Perform administrator actions ; Illegally upload files | Leak sensitive information | Divulge other information |
| Reproducibility | The attacker can attack again at will | The attacker can repeat the attack , But there's a time limit | It is difficult for an attacker to repeat the attack process |
| Exploitability | Beginners can master attack methods in a short time | Only skilled attackers can complete this attack | Vulnerability exploitation conditions are very harsh |
| Affected users | All users , The default configuration , Key users | Some users , Non default configuration | Very few users , Anonymous users |
| Discoverability | The vulnerability is obvious , Attack conditions are easy to obtain | In private areas , Some people can see , We need to dig deep into loopholes | It is extremely difficult to find this vulnerability |
4. Excellent and safe scheme : Can effectively solve problems ; Good user experience ; High performance ; Low coupling ; Easy to expand and upgrade .
1.7 White hat art of war
1.Secure By Default principle
(1)Secure By Default principle , It can also be summarized as White list , The blacklist Thought . If you use whitelists more , Then the system will become more secure .
(2) The principle of minimum authority The system is required to grant only the necessary permissions to the principal , Don't over authorize , This can effectively reduce the system , The Internet , application , Opportunities for database errors .
(3)SSH: Refers to the security protocol based on the application layer , Designed to provide security for remote login sessions and other network services .
2. Defense in depth principle
The principle of defense in depth contains two meanings :
(1) At different levels , Different aspects of implementing security programs , Avoid omissions , Different security schemes need to cooperate with each other , Form a whole ;
(2) Do the right thing in the right place , namely : Implement targeted security solutions where fundamental problems are addressed .
For a complex system , Defense in depth is a necessary choice to build a security system .
3. Principle of separation of data and code
(1) This principle applies to all kinds of reasons “ Inject ” And the scene that causes security problems . actually , out of buffer , It can also be considered that the procedure violates this principle —— The program is on the stack or heap , Execute user data as code , Confusing the boundaries of code and data , This leads to safety problems .
(2) out of buffer : For program design defects , Write to the program input buffer to overflow , Exceeds the maximum amount of data that the buffer can hold , So as to destroy the operation of the program 、 Take advantage of the interruption to gain control of the program and even the system .
4. The principle of unpredictability
(1) Microsoft uses ASLR technology , In the newer version of Linux The kernel also supports . stay ASLR Under the control of , Every time a program starts , The stack base addresses of their processes are different , It has a certain randomness , For the attacker , This is it. “ Unpredictability ”.
(2) Unpredictability , It can effectively resist tampering 、 Fake attacks .
(3) The implementation of unpredictability often needs to use encryption algorithm , Random number algorithm , The hash algorithm , Make good use of this rule , When designing safety schemes, we often get twice the result with half the effort .
边栏推荐
- 测试左移和测试右移,我们为何要“上下求索”?
- 小熊派学习——内核开发
- [FPGA]: IP core ibert
- 题解——Leetcode题库第283题
- 协议圣经-谈端口和四元组
- 零基础学习CANoe Panel(6)—— 开关/显示控件(Switch/Indicator)
- [class, abstraction and inheritance]
- MySQL - update data records in tables
- 零基础学习CANoe Panel(3)—— 静态控件(Static Text , Group Box ,Picture Box)
- Talk about new congestion control
猜你喜欢

LoRa无线技术与LoRaWAN网关模块的区别

Detailed explanation of Flink operation architecture

Zero basic learning canoe panel (4) -- button

UVM——双向通信

Distributed lock implementation scheme (glory collection version)

Real time weather API

MySQL - normal index

Signal processing: < three > DFT and FFT

用 Signal Processing Toolbox 软件对数据进行滤波

MySQL engine
随机推荐
机器学习小试(11)验证码识别测试-使用Qt与Tensorflow2进行深度学习实验
openresty lua-resty-logger-socket日志传输
零基础学习CANoe Panel(9)—— 组合框(ComboBox)
I admire a Google boss very much, and he left..
Overview of basic knowledge of binary tree
轻松读懂三极管,原来它是这样工作的
[about Modelsim simulation] design and Simulation of 4-bit counter
[FPGA]: IP core --divider (divider)
[dish of learning notes dog learning C] initial level of pointer
题解——Leetcode题库第283题
[AHK] AutoHotKey tutorial ①
零基础学习CANoe Panel(7)—— 文件选择(PathDiaglog)
Redis cache settings, similar to putifabsent function
1184. Distance between bus stops: simple simulation problem
数据可视化-《白蛇2:青蛇劫起》(1)
Google cooperates with colleges and universities to develop a general model, proteogan, which can design and generate proteins with new functions
read_ CSV error: 'GBK' codec can't decode byte 0xb4 in position 274: illegal multibyte sequence
Zero basic learning canoe panel (7) -- input/output box
38. REM adaptive layout
Qt创建应用程序托盘及相关功能