[{"createTime":1735734952000,"id":1,"img":"hwy_ms_500_252.jpeg","link":"https://activity.huaweicloud.com/cps.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=V1g3MDY4NTY=&utm_medium=cps&utm_campaign=201905","name":"华为云秒杀","status":9,"txt":"华为云38元秒杀","type":1,"updateTime":1735747411000,"userId":3},{"createTime":1736173885000,"id":2,"img":"txy_480_300.png","link":"https://cloud.tencent.com/act/cps/redirect?redirect=1077&cps_key=edb15096bfff75effaaa8c8bb66138bd&from=console","name":"腾讯云秒杀","status":9,"txt":"腾讯云限量秒杀","type":1,"updateTime":1736173885000,"userId":3},{"createTime":1736177492000,"id":3,"img":"aly_251_140.png","link":"https://www.aliyun.com/minisite/goods?userCode=pwp8kmv3","memo":"","name":"阿里云","status":9,"txt":"阿里云2折起","type":1,"updateTime":1736177492000,"userId":3},{"createTime":1735660800000,"id":4,"img":"vultr_560_300.png","link":"https://www.vultr.com/?ref=9603742-8H","name":"Vultr","status":9,"txt":"Vultr送$100","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":5,"img":"jdy_663_320.jpg","link":"https://3.cn/2ay1-e5t","name":"京东云","status":9,"txt":"京东云特惠专区","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":6,"img":"new_ads.png","link":"https://www.iodraw.com/ads","name":"发布广告","status":9,"txt":"发布广告","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":7,"img":"yun_910_50.png","link":"https://activity.huaweicloud.com/discount_area_v5/index.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=aXhpYW95YW5nOA===&utm_medium=cps&utm_campaign=201905","name":"底部","status":9,"txt":"高性能云服务器2折起","type":2,"updateTime":1735660800000,"userId":3}]
<>CSRF和SSRF详解:
<>CSRF是什么:
CSRF跨站点请求伪造(Cross-Site Request
Forgery),在手段上与XSS漏洞相似,通过盗取被攻击者的身份,以用攻击者的身份去访问服务器,进行操作
<>CSRF攻击原理:
* 被攻击者打开浏览器,访问网站A,输入用户名和密码,发送请求,服务器接收请求,返回响应,其中包含用户的cookie信息。
* 被攻击者在网站A
cookie的有效期内,访问攻击者搭建的网站,被攻击者的网站含有恶意代码,因为浏览器含有网站A的Cookie,所以攻击者可以通过自己搭建的网站用被攻击者的身份去访问网站A
<>CSRF的防御手段:
* 验证HTTP数据包中的referer字段
* 在请求地址中添加token并验证
* 在HTTP头中自定义属性并验证
* 限制请求方式只能为POST
* 当用户发送重要的请求时需要输入原始密码
<>SSRF是什么:
SSRF(Service-SideRequest
Forgery)服务端请求伪造是一种由攻击者构造形成由服务端发送请求的一个安全漏洞。SSRF的主要目标是外网无法访问的内部系统
<>SSRF形成的原因:
SSRF形成的原因主要是服务器提供了从其他服务器应用上获取相应的资源,但是却没有对目标地址进行过滤。
<>SSRF漏洞常见形成的地方:
* 通过url加载或下载图片
* 在线翻译功能:通过url地址加载或上传图片