SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
Web Security System




                     Website Security Systems




Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 1
Web Security System


                         Website Security Systems

       • Website Security Systems is very important for
         a webmaster.
       • If a webmaster to ignore the security aspect of
         a website, the website will be very vulnerable
         to attacks from a hacker.
       • To strengthen the web of security in terms of
         knowledge about web security systems
         needed to be overcome.
Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 2
Web Security System


                                                 Web hacking
       • Web hacking is usually done through port 80.
         Because the website using port 80. The
         attacks are usually carried out are:
          • Deface Site
          • SQL Injection
          • Remote File Inclusion (RFI)
          • Local File Inclusion (LFI)
          • Cross Site Scripting (XSS)
Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 3
Web Security System


                                                   Deface Site
       • Deface is an activity to change the front page
         (index) or the content of a Web site or its
         contents so that the view in accordance with
         the desired.




Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 4
Web Security System


         The techniques of web site Deface
       • Generally the amount of deface can be done
         in 3 ways:
          1. Generally speaking, Enter Illegal Input.
             The aim is that the user was thrown out of
             the directory files and go to the web server
             root directory and then run the cmd.exe
             and observing the structure of the target
             directory on the NT server.
Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 5
Web Security System


         The techniques of web site Deface
       2. With TFTP (Trivial File Transfer Protocol) is a
          UDP based protocol which listen on ports 69
          and is very susceptible safety and most web
          servers running this TFTP service.
       3. With the FTP with a web that has been filled
          deface materials. Each NT server has ftp.exe
          file upload to FTP or FTP downloads.


Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 6
Web Security System


                                                           Netcat
       • Netcat allows you to form their own port
         filter that allows file transfers without using
         FTP. Furthermore, netcat can be used to avoid
         the port filters on most firewalls, spoofing IP
         address, to conduct session hijacking.




Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 7
Web Security System


              Securing IIS Server from Deface
       • Always updating with the latest service packs and
         the latest hotfix.
       • Protect with a firewall and IDS (Intrusion Detection
         System).
       • Eliminating Options Write on the HTTP protocol
         (HTTP 1.0 and HTTP 1.1).
         • Commands supported are:
         CONNECT*, DELETE*, GET, HEAD, OPTIONS, POST,
         PUT, TRACE
Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 8
Web Security System


                                               SQL Injection
       • SQL injection attack is one attack to reach
         access to the database system based on
         Microsoft SQL Server.
       • These techniques take advantage of
         weaknesses in the programming language in
         SQL scripting in processing a database system
         that allows someone without an account can
         enter and pass the verification of the MS SQL
         Server.
Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 9
Web Security System


                                               SQL Injection
       For handling this case is set to:
       • Only certain characters may be inputted.
       • If the illegal character is detected,
         immediately rejected the request.




Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 10
Web Security System


                       Remote File Inclusion (RFI)
       • Methods that exploit the weaknesses of PHP
         scripts include (), include_once (), Require (),
         require_once () the variable is not declared
         properly.
       • With RFI an attacker can either include a file
         that is located outside the respective servers.



Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 11
Web Security System


                             Local File Inclusion (LFI)
       • Methods that exploit the weaknesses of PHP
         scripts include (), include_once (), Require (),
         require_once () the variable is not declared
         properly.
       • With LFI an attacker can either include a file
         that is located on the server concerned.



Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 12
Web Security System


                           Cross Site Scripting (XSS)
       • XSS also known as the CSS is an acronym for
         Cross Site Scripting.
       • XSS is a method to insert HTML or script code
         into a website that is run through a browser
         on the client.




Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 13

Más contenido relacionado

Similar a Website security systems

Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Jeremiah Grossman
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network SecurityUC San Diego
 
Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)Wail Hassan
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...IBM Security
 
Computer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxComputer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxShivamBajaj36
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015kriptonium
 
Html5 Application Security
Html5 Application SecurityHtml5 Application Security
Html5 Application Securitychuckbt
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Luca Bongiorni
 
Managing and Securing Web 2.0
Managing and Securing Web 2.0Managing and Securing Web 2.0
Managing and Securing Web 2.0Jason Edelstein
 
Denis Baranov - Root via XSS
Denis Baranov - Root via XSSDenis Baranov - Root via XSS
Denis Baranov - Root via XSSDefconRussia
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
Layer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfLayer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfdistortdistort
 
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...Felipe Prado
 

Similar a Website security systems (20)

Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Computer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxComputer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptx
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
Lets Make our Web Applications Secure
Lets Make our Web Applications SecureLets Make our Web Applications Secure
Lets Make our Web Applications Secure
 
Html5 Application Security
Html5 Application SecurityHtml5 Application Security
Html5 Application Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
 
Managing and Securing Web 2.0
Managing and Securing Web 2.0Managing and Securing Web 2.0
Managing and Securing Web 2.0
 
Owasp top 10 2017
Owasp top 10 2017Owasp top 10 2017
Owasp top 10 2017
 
Denis Baranov - Root via XSS
Denis Baranov - Root via XSSDenis Baranov - Root via XSS
Denis Baranov - Root via XSS
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Layer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfLayer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdf
 
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
 

Más de Mobile88

Internet - History, present and future
Internet - History, present and futureInternet - History, present and future
Internet - History, present and futureMobile88
 
Domain name server
Domain name serverDomain name server
Domain name serverMobile88
 
Tips for a better success of e commerce
Tips for a better success of e commerceTips for a better success of e commerce
Tips for a better success of e commerceMobile88
 
Tips On Attracting Bulk Traffics into your website
Tips On Attracting Bulk Traffics into your websiteTips On Attracting Bulk Traffics into your website
Tips On Attracting Bulk Traffics into your websiteMobile88
 
UK Online Fraud Report 2010
UK Online Fraud Report 2010 UK Online Fraud Report 2010
UK Online Fraud Report 2010 Mobile88
 
Mobile88 Weekly IT Talks
Mobile88 Weekly IT TalksMobile88 Weekly IT Talks
Mobile88 Weekly IT TalksMobile88
 

Más de Mobile88 (6)

Internet - History, present and future
Internet - History, present and futureInternet - History, present and future
Internet - History, present and future
 
Domain name server
Domain name serverDomain name server
Domain name server
 
Tips for a better success of e commerce
Tips for a better success of e commerceTips for a better success of e commerce
Tips for a better success of e commerce
 
Tips On Attracting Bulk Traffics into your website
Tips On Attracting Bulk Traffics into your websiteTips On Attracting Bulk Traffics into your website
Tips On Attracting Bulk Traffics into your website
 
UK Online Fraud Report 2010
UK Online Fraud Report 2010 UK Online Fraud Report 2010
UK Online Fraud Report 2010
 
Mobile88 Weekly IT Talks
Mobile88 Weekly IT TalksMobile88 Weekly IT Talks
Mobile88 Weekly IT Talks
 

Último

Call Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts Service
Call Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts ServiceCall Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts Service
Call Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts Servicejennyeacort
 
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubai
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services DubaiDubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubai
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubaikojalkojal131
 
How to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our SiteHow to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our Sitegalleryaagency
 
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
Design principles on typography in design
Design principles on typography in designDesign principles on typography in design
Design principles on typography in designnooreen17
 
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,Aginakm1
 
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书zdzoqco
 
西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造kbdhl05e
 
Mookuthi is an artisanal nose ornament brand based in Madras.
Mookuthi is an artisanal nose ornament brand based in Madras.Mookuthi is an artisanal nose ornament brand based in Madras.
Mookuthi is an artisanal nose ornament brand based in Madras.Mookuthi
 
Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...
Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...
Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...mrchrns005
 
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证nhjeo1gg
 
ARt app | UX Case Study
ARt app | UX Case StudyARt app | UX Case Study
ARt app | UX Case StudySophia Viganò
 
shot list for my tv series two steps back
shot list for my tv series two steps backshot list for my tv series two steps back
shot list for my tv series two steps back17lcow074
 
办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一
办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一
办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一Fi L
 
Design Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William VickeryDesign Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William VickeryWilliamVickery6
 
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree 毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree ttt fff
 
How to Empower the future of UX Design with Gen AI
How to Empower the future of UX Design with Gen AIHow to Empower the future of UX Design with Gen AI
How to Empower the future of UX Design with Gen AIyuj
 
办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一
办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一
办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一A SSS
 
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)jennyeacort
 

Último (20)

Call Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts Service
Call Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts ServiceCall Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts Service
Call Girls in Ashok Nagar Delhi ✡️9711147426✡️ Escorts Service
 
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubai
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services DubaiDubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubai
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubai
 
How to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our SiteHow to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our Site
 
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
 
Design principles on typography in design
Design principles on typography in designDesign principles on typography in design
Design principles on typography in design
 
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,
 
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
 
西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造
 
Mookuthi is an artisanal nose ornament brand based in Madras.
Mookuthi is an artisanal nose ornament brand based in Madras.Mookuthi is an artisanal nose ornament brand based in Madras.
Mookuthi is an artisanal nose ornament brand based in Madras.
 
Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...
Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...
Business research proposal mcdo.pptxBusiness research proposal mcdo.pptxBusin...
 
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证
 
ARt app | UX Case Study
ARt app | UX Case StudyARt app | UX Case Study
ARt app | UX Case Study
 
shot list for my tv series two steps back
shot list for my tv series two steps backshot list for my tv series two steps back
shot list for my tv series two steps back
 
办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一
办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一
办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一
 
Design Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William VickeryDesign Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William Vickery
 
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree 毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
How to Empower the future of UX Design with Gen AI
How to Empower the future of UX Design with Gen AIHow to Empower the future of UX Design with Gen AI
How to Empower the future of UX Design with Gen AI
 
办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一
办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一
办理学位证(NTU证书)新加坡南洋理工大学毕业证成绩单原版一比一
 
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
 
Call Girls in Pratap Nagar, 9953056974 Escort Service
Call Girls in Pratap Nagar,  9953056974 Escort ServiceCall Girls in Pratap Nagar,  9953056974 Escort Service
Call Girls in Pratap Nagar, 9953056974 Escort Service
 

Website security systems

  • 1. Web Security System Website Security Systems Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 1
  • 2. Web Security System Website Security Systems • Website Security Systems is very important for a webmaster. • If a webmaster to ignore the security aspect of a website, the website will be very vulnerable to attacks from a hacker. • To strengthen the web of security in terms of knowledge about web security systems needed to be overcome. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 2
  • 3. Web Security System Web hacking • Web hacking is usually done through port 80. Because the website using port 80. The attacks are usually carried out are: • Deface Site • SQL Injection • Remote File Inclusion (RFI) • Local File Inclusion (LFI) • Cross Site Scripting (XSS) Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 3
  • 4. Web Security System Deface Site • Deface is an activity to change the front page (index) or the content of a Web site or its contents so that the view in accordance with the desired. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 4
  • 5. Web Security System The techniques of web site Deface • Generally the amount of deface can be done in 3 ways: 1. Generally speaking, Enter Illegal Input. The aim is that the user was thrown out of the directory files and go to the web server root directory and then run the cmd.exe and observing the structure of the target directory on the NT server. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 5
  • 6. Web Security System The techniques of web site Deface 2. With TFTP (Trivial File Transfer Protocol) is a UDP based protocol which listen on ports 69 and is very susceptible safety and most web servers running this TFTP service. 3. With the FTP with a web that has been filled deface materials. Each NT server has ftp.exe file upload to FTP or FTP downloads. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 6
  • 7. Web Security System Netcat • Netcat allows you to form their own port filter that allows file transfers without using FTP. Furthermore, netcat can be used to avoid the port filters on most firewalls, spoofing IP address, to conduct session hijacking. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 7
  • 8. Web Security System Securing IIS Server from Deface • Always updating with the latest service packs and the latest hotfix. • Protect with a firewall and IDS (Intrusion Detection System). • Eliminating Options Write on the HTTP protocol (HTTP 1.0 and HTTP 1.1). • Commands supported are: CONNECT*, DELETE*, GET, HEAD, OPTIONS, POST, PUT, TRACE Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 8
  • 9. Web Security System SQL Injection • SQL injection attack is one attack to reach access to the database system based on Microsoft SQL Server. • These techniques take advantage of weaknesses in the programming language in SQL scripting in processing a database system that allows someone without an account can enter and pass the verification of the MS SQL Server. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 9
  • 10. Web Security System SQL Injection For handling this case is set to: • Only certain characters may be inputted. • If the illegal character is detected, immediately rejected the request. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 10
  • 11. Web Security System Remote File Inclusion (RFI) • Methods that exploit the weaknesses of PHP scripts include (), include_once (), Require (), require_once () the variable is not declared properly. • With RFI an attacker can either include a file that is located outside the respective servers. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 11
  • 12. Web Security System Local File Inclusion (LFI) • Methods that exploit the weaknesses of PHP scripts include (), include_once (), Require (), require_once () the variable is not declared properly. • With LFI an attacker can either include a file that is located on the server concerned. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 12
  • 13. Web Security System Cross Site Scripting (XSS) • XSS also known as the CSS is an acronym for Cross Site Scripting. • XSS is a method to insert HTML or script code into a website that is run through a browser on the client. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 13