【正文】
es as those about Attacks, exploits, breaking softwareConstructive activitiesas those about design defense and functionalityKnow your code. Trust your codeExternal AnalysisWhy only seven?Know your code. Trust your code安全知識(shí)? 軟件安全的最大的挑戰(zhàn)是我們?nèi)狈υ凇≤浖踩矫娴闹R(shí)和經(jīng)驗(yàn).因此我們需要,也非常有必要給我們的開發(fā)人員設(shè)計(jì)人員,分析人員更多的有關(guān)軟件安全的知識(shí)的培訓(xùn),以期他們具備豐富的軟件安全的知識(shí).Know your code. Trust your code安全知識(shí)Attacks are plex and follow patterns? Make the Client Invisible? Target Programs That Write to Privileged OS Resources ? Use a UserSupplied Configuration File to Run Commands That Elevate Privilege ? Make Use of Configuration File Search Paths ? Direct Access to Executable Files ? Embedding Scripts within Scripts ? Leverage Executable Code in Nonexecutable Files ? Argument Injection ? Command Delimiters ? Multiple Parsers and Double Escapes ? UserSupplied Variable Passed to File System Calls ? Postfix NULL Terminator ? Postfix, Null Terminate, and Backslash ? Relative Path Traversal ? ClientControlled Environment Variables ? UserSupplied Global Variables (DEBUG=1, PHP Globals, and So Forth) ? Session ID, Resource ID, and Blind Trust? Analog InBand Switching Signals (aka “Blue Boxing”) ? Attack Pattern Fragment: Manipulating Terminal Devices ? Simple Script Injection ? Embedding Script in Nonscript Elements ? XSS in HTTP Headers ? HTTP Query Strings ? UserControlled Filename ? Passing Local Filenames to Functions That Expect a URL ? Metacharacters in Email Header? File System Function Injection, Content Based? Clientside Injection, Buffer Overflow? Cause Web Server Misclassification? Alternate Encoding the Leading Ghost Characters? Using Slashes in Alternate Encoding? Using Escaped Slashes in Alternate Encoding ? Unicode Encoding ? UTF8 Encoding ? URL Encoding ? Alternative IP Addresses ? Slashes and URL Encoding Combined ? Web Logs ? Overflow Binary Resource File ? Overflow Variables and Tags ? Overflow Symbolic Links ? MIME Conversion ? HTTP Cookies ? Filter Failure through Buffer Overflow ? Buffer Overflow with Environment Variables ? Buffer Overflow in an API Call ? Buffer Overflow in Local CommandLine Utilities ? Parameter Expansion ? String Format Overflow in syslog() Know your code. Trust your codeKnow your code. Trust your code演講完畢,謝謝觀看