互联网时代的数据安全与个人隐私受到****的挑战,各种新奇的攻击技术层出不穷。如何才能更好地保护我们的数据?《白帽子讲Web安全(纪念版)》将带你走进Web安全的世界,让你了解Web安全的方方面面。黑客不再神秘,攻击技术原来如此,小网站也能找到适合自己的安全道路。大公司如何做安全,为什么要选择这样的方案呢?在《白帽子讲Web安全(纪念版)》中都能找到答案。详细的剖析,让你不仅能“知其然”,更能“知其所以然”。
《白帽子讲Web安全(纪念版)》根据安全宝副总裁吴翰清之前在互联网公司若干年的实际工作经验而写成,在解决方案上具有极强的可操作性;深入分析诸多错误的方法及误区,对安全工作者有很好的参考价值;对安全开发流程与运营的介绍,同样具有深刻的行业指导意义。《纪念版》与前版内容相同,仅为纪念原作以多种语言在**发行的特殊版本,请读者按需选用。
1篇世界观安全
第1 章 我的安***观...................................................................................................2
1.1 Web 安全简史................................................................................................2
1.1.1 中国黑客简史........................................................................................2
1.1.2 黑客技术的发展历程..............................................................................3
1.1.3 Web 安全的兴起....................................................................................5
1.2 黑帽子,白帽子.............................................................................................6
1.3 返璞归真,揭秘安全的本质..........................................................................7
1.4 破除迷信,没有银弹.....................................................................................9
1.5 安全三要素..................................................................................................10
1.6 如何实施安全评估.......................................................................................11
1.6.1 资产等级划分......................................................................................12
1.6.2 威胁分析.............................................................................................13
1.6.3 风险分析.............................................................................................14
1.6.4 设计安全方案......................................................................................15
1.7 白帽子兵法..................................................................................................16
1.7.1 Secure By Default 原则.........................................................................16
1.7.2 纵深防御原则......................................................................................18
1.7.3 数据与代码分离原则............................................................................19
1.7.4 不可预测性原则...................................................................................21
1.8 小结.............................................................................................................22
(附)谁来为漏洞买单?..................................................................................23
第二篇客户端脚本安全
第2 章 浏览器安全.........................................................................................................26
2.1 同源策略......................................................................................................26
2.2 浏览器沙箱..................................................................................................30
2.3 恶意网址拦截..............................................................................................33
2.4 高速发展的浏览器安全...............................................................................36
2.5 小结.............................................................................................................39
第3 章 跨站脚本攻击(XSS) .....................................................................................40
3.1 XSS 简介......................................................................................................40
3.2 XSS 攻击进阶..............................................................................................43
3.2.1 初探XSSPayload.................................................................................43
3.2.2 强大的XSS Payload.............................................................................46
3.2.3 XSS 攻击平台.....................................................................................62
3.2.4 **武器:XSSWorm..........................................................................64
3.2.5 调试....................................................................................73
3.2.6 XSS 构造技巧......................................................................................76
3.2.7 变废为宝:Mission Impossible..............................................................82
3.2.8 容易被忽视的角落:Flash XSS.............................................................85
3.2.9 真的高枕无忧吗: 开发框架..................................................87
3.3 XSS 的防御..................................................................................................89
3.3.1 四两拨千斤:HttpOnly.........................................................................89
3.3.2 输入检查.............................................................................................93
3.3.3 输出检查.............................................................................................95
3.3.4 正确地防御XSS..................................................................................99
3.3.5 处理富文本.......................................................................................102
3.3.6 防御DOM BasedXSS.........................................................................103
3.3.7 换个角度看XSS 的风险.....................................................................107
3.4 小结...........................................................................................................107
第4 章 跨站点请求伪造(CSRF) ............................................................................109
4.1 CSRF 简介.................................................................................................109
4.2 CSRF 进阶.................................................................................................111
4.2.1 浏览器的Cookie 策略........................................................................111
4.2.2 P3P 头的副作用.................................................................................113
4.2.3 GET?POST?......................................................................................116
4.2.4 Flash CSRF........................................................................................118
4.2.5 CSRFWorm.......................................................................................119
4.3 CSRF 的防御..............................................................................................120
4.3.1 验证码..............................................................................................120
4.3.2 RefererCheck.....................................................................................120
4.3.3 Anti CSRFToken................................................................................121
4.4 小结...........................................................................................................124
第5 章 点击劫持(ClickJacking).............................................................................125
5.1 什么是点击劫持.........................................................................................125
5.2 Flash 点击劫持...........................................................................................127
5.3 图片覆盖攻击............................................................................................129
5.4 拖拽劫持与数据窃取.................................................................................131
5.5 ClickJacking 3.0:触屏劫持.......................................................................134
5.6 防御ClickJacking.......................................................................................136
5.6.1 frame busting .....................................................................................136
5.6.2 X-Frame-Options................................................................................137
5.7 小结...........................................................................................................138
第6 章 HTML 5 安全...................................................................................................139
6.1 HTML 5 新标签..........................................................................................139
6.1.1 新标签的XSS....................................................................................139
6.1.2 iframe 的sandbox...............................................................................140
6.1.3 Link Types: noreferrer .........................................................................141
6.1.4 Canvas 的妙用...................................................................................141
6.2 其他安全问题............................................................................................144
6.2.1 Cross-Origin Resource Sharing............................................................. 144
6.2.2 postMessage——跨窗口传递消息.........................................................146
6.2.3 Web Storage.......................................................................................147
6.3 小结...........................................................................................................150
第三篇服务器端应用安全
第7 章 注入攻击..........................................................................................................152
7.1 SQL 注入....................................................................................................152
7.1.1 盲注(Blind Injection) ......................................................................153
7.1.2 Timing Attack....................................................................................155
7.2 数据库攻击技巧.........................................................................................157
7.2.1 常见的攻击技巧.................................................................................157
7.2.2 命令执行...........................................................................................158
7.2.3 攻击存储过程....................................................................................164
7.2.4 编码问题...........................................................................................165
7.2.5 SQL Column Truncation...................................................................... 167
7.3 正确地防御SQL 注入................................................................................170
7.3.1 使用预编译语句.................................................................................171
7.3.2 使用存储过程....................................................................................172
7.3.3 检查数据类型....................................................................................172
7.3.4 使用安全函数....................................................................................172
7.4 其他注入攻击............................................................................................173
7.4.1 XML 注入.........................................................................................173
7.4.2 代码注入...........................................................................................174
7.4.3 CRLF 注入........................................................................................176
7.5 小结...........................................................................................................179
第8 章 文件上传漏洞...................................................................................................180
8.1 文件上传漏洞概述.....................................................................................180
8.1.1 从FCKEditor 文件上传漏洞谈起......................................................... 181
8.1.2 绕过文件上传检查功能......................................................................182
8.2 功能还是漏洞............................................................................................183
8.2.1 Apache 文件解析问题.........................................................................184
8.2.2 IIS 文件解析问题...............................................................................185
8.2.3 PHP CGI 路径解析问题......................................................................187
8.2.4 利用上传文件钓鱼.............................................................................189
8.3 设计安全的文件上传功能..........................................................................190
8.4 小结...........................................................................................................191
第9 章 认证与会话管理...............................................................................................192
9.1 Who am I? ..................................................................................................192
9.2 密码的那些事儿.........................................................................................193
9.3 多因素认证................................................................................................195
9.4 Session 与认证...........................................................................................196
9.5 Session Fixation 攻击.................................................................................198
9.6 Session 保持攻击.......................................................................................199
9.7 单点登录(SSO)......................................................................................201
9.8 小结...........................................................................................................203
第10 章 访问控制........................................................................................................205
10.1 What Can I Do?........................................................................................205
10.2 垂直权限管理...........................................................................................208
10.3 水平权限管理...........................................................................................211
10.4 OAuth 简介..............................................................................................213
10.5 小结..........................................................................................................219
第11 章 加密算法与随机数.........................................................................................220
11.1 概述..........................................................................................................220
11.2 Stream Cipher Attack................................................................................222
11.2.1 Reused Key Attack............................................................................222
11.2.2 Bit-flipping Attack............................................................................228
11.2.3 弱随机IV 问题................................................................................230
11.3 WEP 破解.................................................................................................232
11.4 ECB 模式的缺陷......................................................................................236
11.5 Padding Oracle Attack...............................................................................239
11.6 密钥管理..................................................................................................251
11.7 伪随机数问题...........................................................................................253
11.7.1 弱伪随机数的麻烦...........................................................................253
11.7.2 时间真的随机吗...............................................................................256
11.7.3 破解伪随机数算法的种子.................................................................257
11.7.4 使用安全的随机数...........................................................................265
11.8 小结..........................................................................................................265
(附)Understanding MD5 Length Extension Attack................
评分
评分
评分
评分
评分
评分
评分
评分
本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度,google,bing,sogou 等,本站所有链接都为正版商品购买链接。
© 2025 windowsfront.com All Rights Reserved. 静流书站 版权所有