Ò׽ؽØÍ¼Èí¼þ¡¢µ¥Îļþ¡¢Ãâ°²×°¡¢´¿ÂÌÉ«¡¢½ö160KB

Asp.netÒ³ÃæÖ®¼ä´«µÝ²ÎÊýµÄ¼¸ÖÖ·½·¨

Asp.netÒ³ÃæÖ®¼ä´«µÝ²ÎÊýµÄ¼¸ÖÖ·½·¨
µÚÒ»ÖÖ·½·¨£ºITPUB¸öÈ˿ռäR:s`4eP
ͨ¹ýURLÁ´½ÓµØÖ·´«µÝRequest.QueryStringITPUB¸öÈ˿ռä/G3Z;zZs'| `
send.aspx:ITPUB¸öÈ˿ռä@ V.X@k7P ^L'B
   protected void Button1_Click(object sender, EventArgs e)
Zv!cSZ]6hB ?0     {
q g1bT&o1K G d*v2X0         Request.Redirect("Default2.aspx?username=honge");
&H(u%{/y)@$m4fm0     }ITPUB¸öÈ˿ռä|bI?-V"]
 
r\SuxP:K0receive.aspx:
0u$w'L6e#[kP0string username = Request.QueryString["username"];ÕâÑù¿ÉÒԵõ½²ÎÊýÖµ¡£
µÚ¶þÖÖ·½·¨£º
&Gs6Y;|Vd$f:_D0ͨ¹ýpost·½Ê½Request¡£
-{2D]:WN&[H*G |8R0send.aspxITPUB¸öÈ˿ռä-s4p!q)V-iG5K
<form. id="form1" runat="server" action="receive.aspx" method=post>ITPUB¸öÈ˿ռä SCS tZ~g
     <div>
H*?.Yw$x0  <asp:TextBox ID="username" runat="server"></asp:TextBox>
nTm&|*]\2F#o]G0  //<input type="text" name="username" />ITPUB¸öÈ˿ռä}&F3_cUZ
        <asp:Button ID="Button1" runat="server" nClick="Button1_Click" Text="Button" />ITPUB¸öÈ˿ռä&b Srv"G*iQ+|
 </div>
)x([T0D@0</form>
~(v ^ U6V6G{0 
]:`$c2o(Q1F%{e0receive.aspx
(kl)@"ha!@0string username = Ruquest.Form["receive"];//string username = Ruquest["username"];
µÚÈýÖÖ·½·¨£ºITPUB¸öÈ˿ռäQ v{*pZ_w(A@x
ͨ¹ýsession
-a0?Q)R K@lzR,}D0send.aspx:
5w:Q,Lk5H?W L3n0   protected void Button1_Click(object sender, EventArgs e)
LjK4A N5DN7p;L|0     {
0vr:YkZ4S]8Y0         Session["username"] = "honge";
9S.VxU&DvRF0         Request.Redirect("Default2.aspx");
$F9p(I1rq;k0     }
"VVLAU0 ITPUB¸öÈ˿ռä1f7tRu;c,v~xr"H
receive.aspx:
+n+l


Ïà¹ØÎĵµ£º

asp.netÉí·ÝÑé֤̽Ë÷

¹ÛÆä´óÂÔ£º
1.
Asp.netÊÇÒÀ´æÓÚ IISµÄÒ»¸ö·þÎñ£¬Ëµµ½ Asp.netµÄ°²È«Ïà¹ØµÄ»°Ì⵱ȻҪÓÐÒ»¸öÕûÌåÉϵÄ˼·£º IIS½ÓÊÕ —¡· IISÑéÖ¤ —¡· IISÊÚȨ ---¡· ASP.netÑéÖ¤ ---¡· Asp.netÊÚȨ ---¡·×ÊÔ´·µ»Ø¸øÓû§
IIS´ÓÍøÂçÉϽÓÊÕµ½Ò»¸ö HTTP WEBÇëÇó¿ÉÒÔʹÓà SSL¼¼ÊõÀ´±£Ö¤·þÎñÆ÷µÄÉí·Ý£¬´ËÍâ SSLÒ²¿ÉÒÔÌṩһ¸ö°²È ......

asp.net viewstat Tampering Vulnerabilities

Trustwave's SpiderLabs Security Advisory TWSL2010-001:
Multiplatform View State Tampering Vulnerabilities
Published: 2010-02-08 Version: 1.1
SpiderLabs has documented view state tampering
vulnerabilities in three products from separate vendors.
View states are used by some web application frame ......

SocketͨÐÅδÍê³É£¬×ÔѧASP.NETСÓгÉЧ£¬³õʶAjax

½øÈ¥º®¼Ù£¬ÓÉÓÚÒ»¸ö»ë»ëججµÄѧÆÚ½áÊøÁË£¬²»ÏëÁî×Ô¼º¼ÌÐø³ÁÄçÔÚÄÇ»èÌìºÚµØÖ®ÖУ¬ÓÚÊÇÈ¥Library½èÁËÒ»±¾ºÜºñºÜÖØµÄC# ASP.NETµÄÊ飬¸½¹âÅÌ¡£ÓÐȤµÄ£¬ÎÒÓÃÀúÀ´Ñ§Ï°¿Î±¾ÖªÊ¶µÄ·ÅѧѧϰC#ºÍÊìϤVS»·¾³£¬»¹×öÁ˲»ÉÙ¶ÁÊé±Ê¼Ç£¬°¥£¬ÕæµÄûÄǸö±ØÒª°¡£¬²»¹ý¿´ÁË1-2ÖÜÖ®ºó£¬¶ÔÓÚ·þÎñÆ÷¶Ë¿Ø¼þµÄÈ·ÊÇÊìϤ²»ÉÙ£¬¶ÔÓڱ߽߱ŽŵÄÒ»Ð©Ò³Ãæ ......

ASP.NET ÔËÐлúÖÆ×ܽá


ASP.NET ÔËÐлúÖÆ×ܽá
     ÕâЩÌì¿´ÁËһЩ¹ØÓÚASP.NETµ×²ãµÄÎÄÕÂ,ÊÜÒæ·Ëdz¡£
     ÎªÊ²Ã´ÒªÁ˽âÕâЩµ×²ãÄØ£¿ÎÒ¾õµÃ×öΪһ¸öϲ»¶¿ª·¢ASP.NET³ÌÐòÔ±£¬ÎÒ²»ÃDz»½öÒªÖªµÀ“Ôõô×ö”£¬ÎÒÃǸüÓ¦¸ÃÖªµÀ“ΪʲôÕâô×ö”£¬ÕâÑùµÄÎÒÃDzÅÄÜ×öµÃ¸üºÃ¡£Õâ ......

asp.netÊÊÓÃÓÚIE»òFireFoxµÄ½ûÓÃÒ³Ãæ»º´æµÄÖÕ¼«±ØÉ±¼¼

 
±¾ÎĽéÉܵÄÕâ¸ö¹¦ÄÜÊÇ£º½ûÓÃÒ³Ãæ»º´æµÄ½â¾ö·½·¨£¬ÊÊÓÃÓÚIEºÍFireFoxä¯ÀÀÆ÷Ï£¬ÔÚweb¿ª·¢ÖкÏÀíʹÓûº´æ¿ÉÒÔÓÐЧµÄÌá¸ßÍøÕ¾µÄÐÔÄÜ£¬µ«ÊÇÔÚijЩ³¡ºÏÏÂÒòΪ»º´æµÄ´æÔÚ»á´øÀ´ºÜ¶àµÄÎÊÌâ¡£ÀýÈ磺ÒòΪ»º´æµÄ´æÔÚ»áÔì³ÉÖØ¸´Ìá½»Êý¾ÝµÄÎÊÌ⣬ÑéÖ¤ÂëͼƬ²»ÄÜÕýÈ·ÏÔʾµÄÎÊÌ⣬µÈµÈ¡£Õâ¸öʱºòÎÒÃǾÍÒª½ûÓÃÒ³Ãæ»º´æµÄ¹¦ÄÜ¡£&nbs ......
© 2009 ej38.com All Rights Reserved. ¹ØÓÚE½¡ÍøÁªÏµÎÒÃÇ | Õ¾µãµØÍ¼ | ¸ÓICP±¸09004571ºÅ