
4.4.1 命令注入攻击的原理..............................................................................................................14
4.4.2 命令注入攻击的设计..............................................................................................................14
4.4.3 命令注入攻击的实现..............................................................................................................14
4.5 File Upload 攻击的设计与实现 ...................................................................................................17
4.5.1 File Upload 攻击的原理及危害...........................................................................................17
4.5.2 File Upload 攻击的设计.......................................................................................................17
4.5.3 File Upload 攻击的实现.......................................................................................................18
4.6 CSRF 攻击的设计与实现 .................................................................................................................19
4.6.1 CSRF 攻击的原理.....................................................................................................................19
4.6.2 CSRF 攻击的设计.....................................................................................................................20
4.6.3 CSRF 攻击的实现.....................................................................................................................21
4.7 SQL 注入攻击的设计与实现 ...........................................................................................................21
4.7.1 SQL 注入攻击的原理及危害...................................................................................................21
4.7.2 SQL 注入攻击的设计...............................................................................................................22
4.7.3 SQL 注入攻击的实现...............................................................................................................22
4.8 XSS 攻击的设计与实现 ...................................................................................................................24
4.8.1 XSS 攻击的原理及危害...........................................................................................................24
4.8.2 XSS(Reflected)攻击的设计..............................................................................................25
4.8.3 XSS(Reflected)攻击的实现..............................................................................................26
4.8.4 XSS(Stored)攻击的设计....................................................................................................28
4.8.5 XSS(Stored)攻击的实现....................................................................................................28
4.9 安全等级设置的设计与实现 ...........................................................................................................30
4.9.1 安全等级设置的设计..............................................................................................................30
4.9.2 安全等级设置的实现..............................................................................................................30
5 结论 ...........................................................................................................................................................32
参考文献.......................................................................................................................................................33
谢辞 ..............................................................................................................................................................34
附录 ..............................................................................................................................................................35