Portswigger web security academy:Clickjacking (UI redressing) 目录 Portswigger web security academy:Clickjacking (UI redressing) 1 - Basic clickjacking with CSRF token protection 2 - Clickjacking with form input data prefilled from a URL parameter 3 -…
Portswigger web security academy:Server-side request forgery (SSRF) 目录 Portswigger web security academy:Server-side request forgery (SSRF) Basic SSRF against the local server Basic SSRF against another back-end system SSRF with blacklist-based input…
Portswigger web security academy:OS command injection 目录 Portswigger web security academy:OS command injection OS command injection, simple case Blind OS command injection with time delays Blind OS command injection with out put redirection Blind OS…
Portswigger web security academy:SQL injection 目录 Portswigger web security academy:SQL injection SQL injection vulnerability in WHERE clause allowing retrieval of hidden data SQL injection vulnerability allowing login bypass SQL injection UNION attac…
Portswigger web security academy:Stored XSS 目录 Portswigger web security academy:Stored XSS Stored XSS into HTML context with nothing encoded Stored XSS into anchor href attribute with double quotes HTML-encoded Stored DOM XSS Stored XSS into onclick…
Portswigger web security academy:Reflected XSS 目录 Portswigger web security academy:Reflected XSS Reflected XSS into HTML context with nothing encoded Reflected XSS into HTML context with most tags and attributes blocked Reflected XSS into HTML contex…
Portswigger web security academy:DOM Based XSS 目录 Portswigger web security academy:DOM Based XSS DOM XSS in document.write sink using source location.search DOM XSS in document.write sink using source location.search inside a select element DOM XSS i…
DOM-based vulnerabilities 目录 DOM-based vulnerabilities 1 - DOM XSS using web messages 2 - DOM XSS using web messages and a JavaScript URL 3 - DOM XSS using web messages and JSON.parse 4 - DOM-based open redirection 5 - DOM-based cookie manipulation 6…
实验网站:https://portswigger.net/web-security/xxe XXE学习看一参考下面这篇文章,讲得很全: https://xz.aliyun.com/t/3357#toc-8 Lab: Exploiting XXE using external entities to retrieve files his lab has a "Check stock" feature that parses XML input and returns any unexpe…
FormsAuthentication.HashPasswordForStoringInConfigFile 方法是一个在.NET 4.5中已经废弃不用的API,参见: https://msdn.microsoft.com/zh-cn/library/system.web.security.formsauthentication.hashpasswordforstoringinconfigfile(v=vs.110).aspx This is a solution for SH1 variant…
Writer:BYSocket(泥沙砖瓦浆木匠) 微博:BYSocket 豆瓣:BYSocket Reprint it anywhere u want. Why to write about Web Security? A java file can hack your server.One JSP can download any file. How to do this? 1. Write a JSP and upload to the server. 2. Use JSP to dow…
ref:https://chybeta.github.io/2017/08/19/Web-Security-Learning/ ref:https://github.com/CHYbeta/Web-Security-Learning Web-Security-Learning 学习资料01月29日更新: 新收录文章 mysql SSRF To RCE in MySQL MSSQL MSSQL不使用xp_cmdshell执行命令并获取回显的两种方法 postgresql 渗透中利用postgres…
ylbtech-服务安全-JWT(JSON Web Tokens):百科 JSON Web Tokens是一种开放的行业标准 RFC 7519方法,用于在双方之间安全地表示索赔. JWT.IO允许您解码,验证和生成JWT. 1.返回顶部 1. 新:免费获得JWT手册并深入学习JWT! 什么是JSON Web Token? JSON Web Token(JWT)是一个开放标准(RFC 7519),它定义了一种紧凑且独立的方式,用于在各方之间作为JSON对象安全地传输信息.此信息可以通过数字签名进行…