当前位置:网站首页>P100 MSSQL database penetration test of secondary vocational network security skills competition
P100 MSSQL database penetration test of secondary vocational network security skills competition
2022-07-25 03:22:00 【Beluga】
What is penetration testing
Penetration testing is a process of actively evaluating users' information security measures . Through systematic operation and analysis , Actively discover various defects and weaknesses in the system and network , Such as design defects and technical defects .
Penetration testing is about any weakness of the system 、 Technical defects 、 Active vulnerability analysis process . This active analysis is carried out from the possible location of an attacker , And take the initiative to exploit security vulnerabilities conditionally from this position .
Penetration testing is different from other evaluation methods , The usual evaluation method is to find all relevant security problems according to known information resources or other evaluated objects . Penetration testing is based on known exploitable security vulnerabilities , To find out whether there are corresponding information resources . Usually the evaluation method Evaluation of The results are more comprehensive , Penetration testing pays more attention to the severity of security vulnerabilities .
mssql Database penetration test
1. In the local PC Penetration testing platform BT5 Use in zenmap Tool scan server scenario p100_win03-20 Network segment ( for example :172.16.101.0/24) Live hosts in range IP Address and designated open 1433、3306、80 port . And take the string that needs to be added in the command used by this operation as FLAG Submit ;
Use the command at the command terminal zenmap Open the scanning tool

Fill in the target address , And add after the default parameter -p 1433,3306,80
边栏推荐
- C language_ Structure introduction
- Learning record 10
- Riotboard development board series notes (VIII) -- building desktop system
- How to use two stacks to simulate the implementation of a queue
- ES6 - study notes
- Uni app configuration
- How does Jupiter notebook change themes and font sizes?
- Learning Record V
- Message queue (MQ)
- Bgy development small example
猜你喜欢
![[stm32f130rct6] idea and code of ultrasonic ranging module](/img/a6/1bae9d5d8628f00acf4738008a0a01.png)
[stm32f130rct6] idea and code of ultrasonic ranging module

Bubble sort / heap sort

Merge sort / quick sort

How to use two queues to simulate the implementation of a stack

FLASH read / write problem of stm32cubemx
![Easyexcel sets the style of the last row [which can be expanded to each row]](/img/25/8fb41f222cb3cca0119515d070b667.png)
Easyexcel sets the style of the last row [which can be expanded to each row]

A code takes you to draw multi format sangjimei pictures such as interactive +pdf+png

Force deduction problem 238. product of arrays other than itself

Use of stm32cubemonitor Part II - historical data storage and network access

Mark down learning
随机推荐
From input URL to page presentation
Enter an integer and a binary tree
Task02 | EDA initial experience
Innobackupex parameter description
mysql_ Account authorization permission recycling, account locking and unlocking, account creation and deletion
mysql_ Backup restore_ Specify table_ Backup table_ Restore table_ innobackup
Introduction to Apache Doris grafana monitoring indicators
Learning record XIII
Learning record 10
Learning record Xi
Message queue (MQ)
Banana pie bpi-m5 toss record (2) -- compile u-boot
Bgy development small example
Node queries the path of all files (files or folders) named filename under the target directory
Swiper4 is used to smooth longitudinal seamless scrolling. After clicking or dragging the mouse, the animation is not completely completed, the mouse moves out of the automatic rotation, and the dynam
What is technical support| Daily anecdotes
Image processing based on hog feature
Experiment 4 CTF practice
MySQL configuration in CDH installation
Define macros in makefile and pass them to source code