📜 ⬆️ ⬇️

Security Reverse Engineering vk.com

This post is a small report on the process of reverse design and analysis of the work of the most popular social. networks in the CIS - vk.com. Most of the analysis was carried out by the security side (although the social network itself is very attractive as a high-load project, of course). For myself, made some interesting decisions and just got pleasure. The post turned out to be a bit muddled, so it went down just in interesting moments for me.

Content


Overview

Architecture


Security


miscellanea



Overview

')
First of all, you should read a couple of old, but interesting articles:

After turning on firebug and seeing the site just from the side of the web developer, it immediately becomes clear that there is some mess inside (we’ll return to it at the end of the article), the lack of dispatchers (perhaps to reduce the load), scattered styles and js files and much more. But in general, a straightforward web application that uses nodejs in busy places, and for the rest “standard” (I would even say “worn out”) development technologies (excluding their undisclosed database. I also tune the balancers configuration).

Architecture



Security

Before starting this section, I will send a link to the post of Eugene Kaspersky, although some points are already irrelevant - e-kaspersky.livejournal.com/70000.html


miscellanea


Garbage


And "in detail". Base begin to clean. For example, the limit of messages with the user in the correspondence is large, but already cleared. Various other developments left trash in a notebook.

Maybe somewhere I was mistaken in the idea of ​​the work of the resource and you have a clearer idea about some of the points described above or studied something yourself - I will be glad to hear and discuss them in the comments.

Source: https://habr.com/ru/post/156517/


All Articles