Vulnerability Overview - Principles of 0day Vulnerability Exploitation(0)

The 0day topic is a big challenge for the author, but no matter how difficult it is, the author will insist on practicing a lot of new and old technologies (proficient in binary, assembly language, and the underlying knowledge of the operating system ) and try to improve it as much as possible. Use technology to promote positive energy. 

bugs and vulnerabilities

     With the development of the modern software industry, the scale of software continues to expand, and the logic inside the software has become extremely complex. In order to ensure the quality of software, the status of testing link in the software life cycle has been generally paid attention to. In some well-known large software companies, testing (QA) consumes more resources than development. Even so, no one dares to claim to be able to completely eliminate all logic defects-bugs in software, both in theory and in engineering. Among all kinds of software logic defects, some of them can cause very serious consequences. For example, in the website system, if there is a defect in the limitation of user input data, the server will become the target of SQL injection attack and XSS (Cross SiteScript, cross-site scripting) attack: when the server software parses the protocol, if it encounters Unexpected data format without proper exception handling is likely to provide an attacker with the opportunity to remotely control the server. We usually refer to this kind of bugs that can cause software to do something "beyond the design range" as vulnerabilities (vulnerability).

(1) Functional logic defect (bug): It affects the normal function of the software, for example, execution result error, icon display error, etc.

(2) Security logic flaws (vulnerabilities): Normally, they do not affect the normal functions of the software, but after being successfully exploited by attackers, it may cause the software to execute additional malicious codes. Common vulnerabilities include buffer overflow vulnerabilities in software, cross-site scripting vulnerabilities (XSS) in websites, SOL injection vulnerabilities, etc.

Several Confusing Security Questions
Maybe you have some computer knowledge, but you still often struggle with the following security questions.
(1) I from

Guess you like

Origin blog.csdn.net/luozhonghua2014/article/details/130907263