web系统漏洞攻击靶场
摘  要
    互联网极速发展的同时,也会带来一些安全性的风险,一些不为人知的安全问题也逐渐暴露出来。近年来,媒体不断披露了许多网络安全事故,许多网络应用程序被黑客攻击,导致内部数据外泄,人们开始认识到网络安全越来越重要。现在的人普遍对网络攻击和攻击危害这方面的知识了解较少,为了让更多人了解网络攻击的危害性、学习网站漏洞攻击的知识和学习如何出网站的漏洞,于是建立了一个可供用户了解和学习web攻击类型和方法的漏洞攻击靶场系统。
    web系统漏洞攻击靶场是一个让用户学习如何去攻击一个存在漏洞的系统,为一些开发人员去检测自己的开发技术和提供一个可合法测试的环境,在这个网站中,就存在着一些流行的web漏洞,目的就是为了让用户看到被攻击成果的效果。 web系统漏洞攻击靶场是一个基于PHP+MySQL所开发的Web应用系统,而这个系统主要是建立一个可供攻击的靶场,采用如今比较多的攻击方式。用户可自行选择模块进行模拟攻击,还设有不同等级,随着等级的提高防护机制也将提高,用户需要到防护机制的漏洞,采用不同的攻击方式去达到攻击网
站的目的。
关键字:web漏洞;攻击方法;防护机制;

Web System vulnerability attacking range
Abstract
    The fast development of the Web also brings some security questions, hidden behind the security problems are gradually exposed. In recent years, many network security incidents have been continuously disclosed by the media, and a large number of Web applications have been attacked by hackers, resulting in data leakage, and people are starting to notice the growing importance of cyber security. People are generally of network attack and attack damage this knowledge to understand less. For people to know the dangers of web attacks, learning website of vulnerability of knowledge and learn how to identify a loophole in the site, and has set up a available for users to understand and le
arn attack types and methods of website.
The web system vulnerability attack range is a system that allows users to learn how to attack a vulnerability, providing a legitimate environment for security professionals to test their expertise and tools. In this website itself, There are some popular web vulnerabilities, the purpose is to let the user see the results of the attack effect. The system vulnerability attacking range is such a website. The web system vulnerability attack target is a web application system developed based on PHP+MySQL, and this system is mainly to establish a target range for attack, using more attack methods.Users can choose their own module to simulate attacks, there are also different levels, with the level of protection mechanism will be improved, users need to find the protection mechanism vulnerability, use different ways to attack the purpose of the site.
Keywords: web loopholes; attack methods; protective mechanism;
3 数据库设计和构建    6
4系统的设计与实现    8
4.3.1 蛮力攻击的原理及危害    11
4.4 命令注入攻击的设计与实现    php修改数据库内容14
4.8.2 XSSReflected)攻击的设计    25

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系QQ:729038198,我们将在24小时内删除。