文件名称:ch18
- 所属分类:
- JSP源码/Java
- 资源属性:
- [Java] [源码]
- 上传时间:
- 2012-11-26
- 文件大小:
- 12kb
- 下载次数:
- 0次
- 提 供 者:
- lail*****
- 相关连接:
- 无
- 下载说明:
- 别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容均来自于网络,请自行研究使用
本目录下存放了演示web应用安全技术的例程序,具体用法如下:
1.attack目录是演示JSP安全性漏洞及对策的web应用程序,可以直接部署到应用服务器并运行。
2.security目录下存放演示保护web资源的例程序,tomcat子目录下存放可以在tomcat下运行的web应用程序(security目录)及在
tomcat下配置安全域的配置文件样例(配置文件目录), weblogic子目录存放可以在weblogic下运行的web应用程序。-Catalog stored a demo web application security technology Example procedures, specific usage is as follows: 1.attack directory is demo JSP security vulnerabilities and countermeasures of web applications, can be directly deployed to the application server and run. Store directory 2.security demo protection procedures web resources Example, tomcat subdirectory stored in tomcat running under the web application (security catalog) and in the tomcat configuration under the security domain of the sample configuration file (configuration file directory), weblogic subdirectories can be stored in the weblogic running web applications.
1.attack目录是演示JSP安全性漏洞及对策的web应用程序,可以直接部署到应用服务器并运行。
2.security目录下存放演示保护web资源的例程序,tomcat子目录下存放可以在tomcat下运行的web应用程序(security目录)及在
tomcat下配置安全域的配置文件样例(配置文件目录), weblogic子目录存放可以在weblogic下运行的web应用程序。-Catalog stored a demo web application security technology Example procedures, specific usage is as follows: 1.attack directory is demo JSP security vulnerabilities and countermeasures of web applications, can be directly deployed to the application server and run. Store directory 2.security demo protection procedures web resources Example, tomcat subdirectory stored in tomcat running under the web application (security catalog) and in the tomcat configuration under the security domain of the sample configuration file (configuration file directory), weblogic subdirectories can be stored in the weblogic running web applications.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
ch18
....\attack
....\......\htmlInject.jsp
....\......\WEB-INF
....\......\.......\web.xml
....\......\xssTest.jsp
....\readme.txt
....\security
....\........\tomcat
....\........\......\security
....\........\......\........\admin
....\........\......\........\.....\edit.jsp
....\........\......\........\fail_login.html
....\........\......\........\login.jsp
....\........\......\........\WEB-INF
....\........\......\........\.......\web.xml
....\........\......\........\welcome.jsp
....\........\......\配置文件
....\........\......\........\server.xml
....\........\......\........\tomcat-users.xml
....\........\weblogic
....\........\........\security
....\........\........\........\admin
....\........\........\........\.....\edit.jsp
....\........\........\........\fail_login.html
....\........\........\........\login.jsp
....\........\........\........\WEB-INF
....\........\........\........\.......\web.xml
....\........\........\........\.......\weblogic.xml
....\........\........\........\welcome.jsp
....\attack
....\......\htmlInject.jsp
....\......\WEB-INF
....\......\.......\web.xml
....\......\xssTest.jsp
....\readme.txt
....\security
....\........\tomcat
....\........\......\security
....\........\......\........\admin
....\........\......\........\.....\edit.jsp
....\........\......\........\fail_login.html
....\........\......\........\login.jsp
....\........\......\........\WEB-INF
....\........\......\........\.......\web.xml
....\........\......\........\welcome.jsp
....\........\......\配置文件
....\........\......\........\server.xml
....\........\......\........\tomcat-users.xml
....\........\weblogic
....\........\........\security
....\........\........\........\admin
....\........\........\........\.....\edit.jsp
....\........\........\........\fail_login.html
....\........\........\........\login.jsp
....\........\........\........\WEB-INF
....\........\........\........\.......\web.xml
....\........\........\........\.......\weblogic.xml
....\........\........\........\welcome.jsp