mirror of
https://github.com/linkedin/school-of-sre
synced 2026-01-19 15:08:03 +00:00
Revert "mkdocs.yml: Add syntax highlighting (#89)"
This reverts commit 7aebfc652c.
This commit is contained in:
@@ -42,7 +42,7 @@
|
||||
- Fail securely
|
||||
- Applications regularly fail to process transactions for many reasons. How they fail can determine if an application is secure or not.
|
||||
|
||||
```java
|
||||
```
|
||||
|
||||
is_admin = true;
|
||||
try {
|
||||
@@ -113,7 +113,7 @@
|
||||
|
||||
- Ciphers are the cornerstone of cryptography. A cipher is a set of algorithms that performs encryption or decryption on a message. An encryption algorithm (E) takes a secret key (k) and a message (m) and produces a ciphertext (c). Similarly, a Decryption algorithm (D) takes a secret key (K) and the previous resulting Ciphertext (C). They are represented as follows:
|
||||
|
||||
```text
|
||||
```
|
||||
|
||||
E(k,m) = c
|
||||
D(k,c) = m
|
||||
@@ -122,7 +122,7 @@ D(k,c) = m
|
||||
|
||||
- This also means that for it to be a cipher, it must satisfy the consistency equation as follows, making it possible to decrypt.
|
||||
|
||||
```text
|
||||
```
|
||||
|
||||
D(k,E(k,m)) = m
|
||||
```
|
||||
|
||||
@@ -142,7 +142,7 @@ Let us see how we keep a check on the perimeter i.e the edges, the first layer o
|
||||
- Nmap is often used to determine alive hosts in a network, open ports on those hosts, services running on those open ports, and version identification of that service on that port.
|
||||
- More at http://scanme.nmap.org/
|
||||
|
||||
```bash
|
||||
```
|
||||
nmap [scan type] [options] [target specification]
|
||||
```
|
||||
|
||||
@@ -417,7 +417,7 @@ TCP Flags
|
||||
|
||||
- Abuse of the normal operation or settings of these flags can be used by attackers to launch DoS attacks. This causes network servers or web servers to crash or hang.
|
||||
|
||||
```text
|
||||
```
|
||||
| SYN | FIN | PSH | RST | Validity|
|
||||
|------|------|-------|------|---------|
|
||||
| 1 |1 |0 |0 |Illegal Combination
|
||||
|
||||
@@ -100,7 +100,7 @@ BGP Security
|
||||
- A successful exploit will allow attackers to access, modify, or delete information in the database.
|
||||
- It permits attackers to steal sensitive information stored within the backend databases of affected websites, which may include such things as user credentials, email addresses, personal information, and credit card numbers
|
||||
|
||||
```sql
|
||||
```
|
||||
SELECT USERNAME,PASSWORD from USERS where USERNAME='<username>' AND PASSWORD='<password>';
|
||||
|
||||
Here the username & password is the input provided by the user. Suppose an attacker gives the input as " OR '1'='1'" in both fields. Therefore the SQL query will look like:
|
||||
|
||||
Reference in New Issue
Block a user