实验网站:https://portswigger.net/web-security/xxe XXE学习看一参考下面这篇文章,讲得很全: https://xz.aliyun.com/t/3357#toc-8 Lab: Exploiting XXE using external entities to retrieve files his lab has a "Check stock" feature that parses XML input and returns any unexpe…
Portswigger web security academy:Clickjacking (UI redressing) 目录 Portswigger web security academy:Clickjacking (UI redressing) 1 - Basic clickjacking with CSRF token protection 2 - Clickjacking with form input data prefilled from a URL parameter 3 -…
Portswigger web security academy:Server-side request forgery (SSRF) 目录 Portswigger web security academy:Server-side request forgery (SSRF) Basic SSRF against the local server Basic SSRF against another back-end system SSRF with blacklist-based input…
Portswigger web security academy:OS command injection 目录 Portswigger web security academy:OS command injection OS command injection, simple case Blind OS command injection with time delays Blind OS command injection with out put redirection Blind OS…
Portswigger web security academy:SQL injection 目录 Portswigger web security academy:SQL injection SQL injection vulnerability in WHERE clause allowing retrieval of hidden data SQL injection vulnerability allowing login bypass SQL injection UNION attac…