目 录 1 黑客简介...................................................................................................................................2 2 保护自己电脑绝对不做黑客肉鸡...........................................................................................2 3 抓肉鸡的几种方法...................................................................................................................5 4 防止黑客通过Explorer 侵入系统...........................................................................................9 5 SQL 注入详解........................................................................................................................10 5.1 注入工具.....................................................................................................................11 5.2 php+Mysql 注入的误区.............................................................................................11 5.3 简单的例子.................................................................................................................12 5.4 语句构造.....................................................................................................................14 5.5 高级应用.....................................................................................................................22 5.6 实例.............................................................................................................................26 5.7 注入的防范.................................................................................................................29 5.8 我看暴库漏洞原理及规律1......................................................................................29 5.9 我看暴库漏洞原理及规律2......................................................................................32 6 跨站脚本攻击.........................................................................................................................34 6.1 跨站脚本工具.............................................................................................................34 6.2 什么是XSS 攻击.......................................................................................................35 6.3 如何寻找XSS 漏洞...................................................................................................35 6.4 寻找跨站漏洞.............................................................................................................36 6.5 如何利用.....................................................................................................................36 6.6 XSS 与其它技术的结合............................................................................................38 7 XPath 注入..............................................................................................................................38 7.1 XPath 注入介绍..........................................................................................................38 7.2 XPath 注入工具..........................................................................................................41 |