Portswigger web security academy:Server-side request forgery (SSRF) 目录 Portswigger web security academy:Server-side request forgery (SSRF) Basic SSRF against the local server Basic SSRF against another back-end system SSRF with blacklist-based input…
Portswigger web security academy:Reflected XSS 目录 Portswigger web security academy:Reflected XSS Reflected XSS into HTML context with nothing encoded Reflected XSS into HTML context with most tags and attributes blocked Reflected XSS into HTML contex…
Portswigger web security academy:Clickjacking (UI redressing) 目录 Portswigger web security academy:Clickjacking (UI redressing) 1 - Basic clickjacking with CSRF token protection 2 - Clickjacking with form input data prefilled from a URL parameter 3 -…
Portswigger web security academy:OS command injection 目录 Portswigger web security academy:OS command injection OS command injection, simple case Blind OS command injection with time delays Blind OS command injection with out put redirection Blind OS…
Portswigger web security academy:SQL injection 目录 Portswigger web security academy:SQL injection SQL injection vulnerability in WHERE clause allowing retrieval of hidden data SQL injection vulnerability allowing login bypass SQL injection UNION attac…
Portswigger web security academy:Stored XSS 目录 Portswigger web security academy:Stored XSS Stored XSS into HTML context with nothing encoded Stored XSS into anchor href attribute with double quotes HTML-encoded Stored DOM XSS Stored XSS into onclick…
Portswigger web security academy:DOM Based XSS 目录 Portswigger web security academy:DOM Based XSS DOM XSS in document.write sink using source location.search DOM XSS in document.write sink using source location.search inside a select element DOM XSS i…
DOM-based vulnerabilities 目录 DOM-based vulnerabilities 1 - DOM XSS using web messages 2 - DOM XSS using web messages and a JavaScript URL 3 - DOM XSS using web messages and JSON.parse 4 - DOM-based open redirection 5 - DOM-based cookie manipulation 6…
实验网站:https://portswigger.net/web-security/xxe XXE学习看一参考下面这篇文章,讲得很全: https://xz.aliyun.com/t/3357#toc-8 Lab: Exploiting XXE using external entities to retrieve files his lab has a "Check stock" feature that parses XML input and returns any unexpe…
ref:https://chybeta.github.io/2017/08/19/Web-Security-Learning/ ref:https://github.com/CHYbeta/Web-Security-Learning Web-Security-Learning 学习资料01月29日更新: 新收录文章 mysql SSRF To RCE in MySQL MSSQL MSSQL不使用xp_cmdshell执行命令并获取回显的两种方法 postgresql 渗透中利用postgres…
问题 zabbix启动web界面提示: Can't connect to local MySQL server through socket '/var/lib/mysql/mysql.sock' (2) 解决 这是由于修改mysql服务的了socket文件mysql.sock位置,而导致无法通过mysql socket文件连接到mysql服务引起的,具体解决办法如下: # vim /etc/my.cnf 我们需要修改/etc/my.ini文件:加上一行. mysql.default_socke…
报错信息:Server Tomcat v7.0 Server at localhost failed to start. 报错截图: 原因分析:在使用SSM框架时,生成的mapping与系统配置文件不符合 web.xml文件mapping配置和controller方法如下: 解决方法:把配置和方法的mapping值结构配一致…
错误提示如下 Could not GET 'https://dl.google.com/dl/android/maven2/com/android/tools/build/gradle/3.1.2/ gradle-3.1.2.pom'. Received status code 400 from server: Bad Request. 但是实际上你访问此网址是能够下载这些东西的,这说明并不是网络的问题, 那么是什么问题呢? 解决方案 打开路径 C:\Users\<用户名>\.gradle 找…
http://docs.spring.io/spring-security/site/docs/3.2.0.CI-SNAPSHOT/reference/html/csrf.html 13. Cross Site Request Forgery (CSRF) This section discusses Spring Security's Cross Site Request Forgery (CSRF) support. 13.1 CSRF Attacks Before we discuss h…
Web API 2:Action的返回类型 Web API控制器中的Action方法有如下几种返回类型: void HttpResponseMessage IHttpActionResult 其它类型 基于上面几种不同的返回类型,Web API创建HTTP响应消息的机制也不同. 返回类型 Web API创建HTTP响应消息的机制 void 返回HTTP状态码204(无内容) HttpResponseMessage 直接转换成HTTP响应消息 IHttpActionResult 调用接口的Exec…
Writer:BYSocket(泥沙砖瓦浆木匠) 微博:BYSocket 豆瓣:BYSocket Reprint it anywhere u want. Why to write about Web Security? A java file can hack your server.One JSP can download any file. How to do this? 1. Write a JSP and upload to the server. 2. Use JSP to dow…