互聯網時代的數據安全與個人隱私受到****的挑戰,各種新奇的攻擊技術層齣不窮。如何纔能更好地保護我們的數據?《白帽子講Web安全(紀念版)》將帶你走進Web安全的世界,讓你瞭解Web安全的方方麵麵。黑客不再神秘,攻擊技術原來如此,小網站也能找到適閤自己的安全道路。大公司如何做安全,為什麼要選擇這樣的方案呢?在《白帽子講Web安全(紀念版)》中都能找到答案。詳細的剖析,讓你不僅能“知其然”,更能“知其所以然”。
《白帽子講Web安全(紀念版)》根據安全寶副總裁吳翰清之前在互聯網公司若乾年的實際工作經驗而寫成,在解決方案上具有極強的可操作性;深入分析諸多錯誤的方法及誤區,對安全工作者有很好的參考價值;對安全開發流程與運營的介紹,同樣具有深刻的行業指導意義。《紀念版》與前版內容相同,僅為紀念原作以多種語言在**發行的特殊版本,請讀者按需選用。
1篇世界觀安全
第1 章 我的安***觀...................................................................................................2
1.1 Web 安全簡史................................................................................................2
1.1.1 中國黑客簡史........................................................................................2
1.1.2 黑客技術的發展曆程..............................................................................3
1.1.3 Web 安全的興起....................................................................................5
1.2 黑帽子,白帽子.............................................................................................6
1.3 返璞歸真,揭秘安全的本質..........................................................................7
1.4 破除迷信,沒有銀彈.....................................................................................9
1.5 安全三要素..................................................................................................10
1.6 如何實施安全評估.......................................................................................11
1.6.1 資産等級劃分......................................................................................12
1.6.2 威脅分析.............................................................................................13
1.6.3 風險分析.............................................................................................14
1.6.4 設計安全方案......................................................................................15
1.7 白帽子兵法..................................................................................................16
1.7.1 Secure By Default 原則.........................................................................16
1.7.2 縱深防禦原則......................................................................................18
1.7.3 數據與代碼分離原則............................................................................19
1.7.4 不可預測性原則...................................................................................21
1.8 小結.............................................................................................................22
(附)誰來為漏洞買單?..................................................................................23
第二篇客戶端腳本安全
第2 章 瀏覽器安全.........................................................................................................26
2.1 同源策略......................................................................................................26
2.2 瀏覽器沙箱..................................................................................................30
2.3 惡意網址攔截..............................................................................................33
2.4 高速發展的瀏覽器安全...............................................................................36
2.5 小結.............................................................................................................39
第3 章 跨站腳本攻擊(XSS) .....................................................................................40
3.1 XSS 簡介......................................................................................................40
3.2 XSS 攻擊進階..............................................................................................43
3.2.1 初探XSSPayload.................................................................................43
3.2.2 強大的XSS Payload.............................................................................46
3.2.3 XSS 攻擊平颱.....................................................................................62
3.2.4 **武器:XSSWorm..........................................................................64
3.2.5 調試....................................................................................73
3.2.6 XSS 構造技巧......................................................................................76
3.2.7 變廢為寶:Mission Impossible..............................................................82
3.2.8 容易被忽視的角落:Flash XSS.............................................................85
3.2.9 真的高枕無憂嗎: 開發框架..................................................87
3.3 XSS 的防禦..................................................................................................89
3.3.1 四兩撥韆斤:HttpOnly.........................................................................89
3.3.2 輸入檢查.............................................................................................93
3.3.3 輸齣檢查.............................................................................................95
3.3.4 正確地防禦XSS..................................................................................99
3.3.5 處理富文本.......................................................................................102
3.3.6 防禦DOM BasedXSS.........................................................................103
3.3.7 換個角度看XSS 的風險.....................................................................107
3.4 小結...........................................................................................................107
第4 章 跨站點請求僞造(CSRF) ............................................................................109
4.1 CSRF 簡介.................................................................................................109
4.2 CSRF 進階.................................................................................................111
4.2.1 瀏覽器的Cookie 策略........................................................................111
4.2.2 P3P 頭的副作用.................................................................................113
4.2.3 GET?POST?......................................................................................116
4.2.4 Flash CSRF........................................................................................118
4.2.5 CSRFWorm.......................................................................................119
4.3 CSRF 的防禦..............................................................................................120
4.3.1 驗證碼..............................................................................................120
4.3.2 RefererCheck.....................................................................................120
4.3.3 Anti CSRFToken................................................................................121
4.4 小結...........................................................................................................124
第5 章 點擊劫持(ClickJacking).............................................................................125
5.1 什麼是點擊劫持.........................................................................................125
5.2 Flash 點擊劫持...........................................................................................127
5.3 圖片覆蓋攻擊............................................................................................129
5.4 拖拽劫持與數據竊取.................................................................................131
5.5 ClickJacking 3.0:觸屏劫持.......................................................................134
5.6 防禦ClickJacking.......................................................................................136
5.6.1 frame busting .....................................................................................136
5.6.2 X-Frame-Options................................................................................137
5.7 小結...........................................................................................................138
第6 章 HTML 5 安全...................................................................................................139
6.1 HTML 5 新標簽..........................................................................................139
6.1.1 新標簽的XSS....................................................................................139
6.1.2 iframe 的sandbox...............................................................................140
6.1.3 Link Types: noreferrer .........................................................................141
6.1.4 Canvas 的妙用...................................................................................141
6.2 其他安全問題............................................................................................144
6.2.1 Cross-Origin Resource Sharing............................................................. 144
6.2.2 postMessage——跨窗口傳遞消息.........................................................146
6.2.3 Web Storage.......................................................................................147
6.3 小結...........................................................................................................150
第三篇服務器端應用安全
第7 章 注入攻擊..........................................................................................................152
7.1 SQL 注入....................................................................................................152
7.1.1 盲注(Blind Injection) ......................................................................153
7.1.2 Timing Attack....................................................................................155
7.2 數據庫攻擊技巧.........................................................................................157
7.2.1 常見的攻擊技巧.................................................................................157
7.2.2 命令執行...........................................................................................158
7.2.3 攻擊存儲過程....................................................................................164
7.2.4 編碼問題...........................................................................................165
7.2.5 SQL Column Truncation...................................................................... 167
7.3 正確地防禦SQL 注入................................................................................170
7.3.1 使用預編譯語句.................................................................................171
7.3.2 使用存儲過程....................................................................................172
7.3.3 檢查數據類型....................................................................................172
7.3.4 使用安全函數....................................................................................172
7.4 其他注入攻擊............................................................................................173
7.4.1 XML 注入.........................................................................................173
7.4.2 代碼注入...........................................................................................174
7.4.3 CRLF 注入........................................................................................176
7.5 小結...........................................................................................................179
第8 章 文件上傳漏洞...................................................................................................180
8.1 文件上傳漏洞概述.....................................................................................180
8.1.1 從FCKEditor 文件上傳漏洞談起......................................................... 181
8.1.2 繞過文件上傳檢查功能......................................................................182
8.2 功能還是漏洞............................................................................................183
8.2.1 Apache 文件解析問題.........................................................................184
8.2.2 IIS 文件解析問題...............................................................................185
8.2.3 PHP CGI 路徑解析問題......................................................................187
8.2.4 利用上傳文件釣魚.............................................................................189
8.3 設計安全的文件上傳功能..........................................................................190
8.4 小結...........................................................................................................191
第9 章 認證與會話管理...............................................................................................192
9.1 Who am I? ..................................................................................................192
9.2 密碼的那些事兒.........................................................................................193
9.3 多因素認證................................................................................................195
9.4 Session 與認證...........................................................................................196
9.5 Session Fixation 攻擊.................................................................................198
9.6 Session 保持攻擊.......................................................................................199
9.7 單點登錄(SSO)......................................................................................201
9.8 小結...........................................................................................................203
第10 章 訪問控製........................................................................................................205
10.1 What Can I Do?........................................................................................205
10.2 垂直權限管理...........................................................................................208
10.3 水平權限管理...........................................................................................211
10.4 OAuth 簡介..............................................................................................213
10.5 小結..........................................................................................................219
第11 章 加密算法與隨機數.........................................................................................220
11.1 概述..........................................................................................................220
11.2 Stream Cipher Attack................................................................................222
11.2.1 Reused Key Attack............................................................................222
11.2.2 Bit-flipping Attack............................................................................228
11.2.3 弱隨機IV 問題................................................................................230
11.3 WEP 破解.................................................................................................232
11.4 ECB 模式的缺陷......................................................................................236
11.5 Padding Oracle Attack...............................................................................239
11.6 密鑰管理..................................................................................................251
11.7 僞隨機數問題...........................................................................................253
11.7.1 弱僞隨機數的麻煩...........................................................................253
11.7.2 時間真的隨機嗎...............................................................................256
11.7.3 破解僞隨機數算法的種子.................................................................257
11.7.4 使用安全的隨機數...........................................................................265
11.8 小結..........................................................................................................265
(附)Understanding MD5 Length Extension Attack................
評分
評分
評分
評分
評分
評分
評分
評分
本站所有內容均為互聯網搜尋引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度,google,bing,sogou 等
© 2025 book.cndgn.com All Rights Reserved. 新城书站 版權所有