Skip to content

Commit 2e3ba21

Browse files
committed
Updates README.md
Auto commit by GitBook Editor
1 parent dbb0660 commit 2e3ba21

File tree

1 file changed

+29
-19
lines changed

1 file changed

+29
-19
lines changed

README.md

Lines changed: 29 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,28 @@
11
# [Web-Security-Learning](https://chybeta.github.io/2017/08/19/Web-Security-Learning/)
22

33
在学习Web安全的过程中整合的一些资料。
4-
该repo会不断更新,最近更新日期为:2017/9/12
4+
该repo会不断更新,最近更新日期为:2017/9/19
55

66
同步更新于: [chybeta: Web-Security-Learning (带目录) ](https://chybeta.github.io/2017/08/19/Web-Security-Learning/)
77

8-
9月12日更新
8+
9月19日更新
99
+ 新收录文章:
10-
+ 渗透技巧:
11-
+ [谈谈端口探测的经验与原理](http://www.freebuf.com/articles/network/146087.html)
12-
+ [乙方渗透测试之Fuzz爆破](http://www.cnnetarmy.com/%E4%B9%99%E6%96%B9%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E4%B9%8BFuzz%E7%88%86%E7%A0%B4/)
13-
+ 渗透实战;
14-
+ [渗透测试学习笔记之案例四](http://avfisher.win/archives/784)
15-
+ [记一次内网渗透](http://killbit.me/2017/09/11/%E8%AE%B0%E4%B8%80%E6%AC%A1%E5%86%85%E7%BD%91%E6%B8%97%E9%80%8F/)
16-
+ XSS:
17-
+ [XSS Without Dots](https://markitzeroday.com/character-restrictions/xss/2017/07/26/xss-without-dots.html)
18-
+ XXE:
19-
+ [XML? Be cautious!](https://blog.pragmatists.com/xml-be-cautious-69a981fdc56a)
20-
+ SSRF:
21-
+ [Use DNS Rebinding to Bypass SSRF in Java](https://mp.weixin.qq.com/s?__biz=MzIzOTQ5NjUzOQ==&mid=2247483742&idx=1&sn=e7265d5351a6d9ed30d90be1c17be041)
10+
+ 前端安全:
11+
+ [妙用JavaScript绕过XSS过滤](http://bobao.360.cn/learning/detail/4414.html)
12+
+ [如何绕过Edge、Chrome和Safari的内容安全策略](http://bobao.360.cn/learning/detail/4406.html)
13+
+ [SheepSec: 7 Reflected Cross-site Scripting (XSS) Examples](http://sheepsec.com/blog/7-reflected-xss.html)
14+
+ [JavaScript Dangerous Functions (Part 1) - HTML Manipulation ](http://blog.blueclosure.com/2017/09/javascript-dangerous-functions-part-1.html)
15+
+ SSTI:
16+
+ [Ruby ERB Template Injection](https://www.trustedsec.com/2017/09/rubyerb-template-injection/)
2217
+ PHP:
23-
+ [从WordPress SQLi谈PHP格式化字符串问题](https://paper.seebug.org/386/)
24-
+ python-Web:
25-
+ [Exploiting Python Deserialization Vulnerabilities](https://crowdshield.com/blog.php?name=exploiting-python-deserialization-vulnerabilities)
18+
+ [Xdebug: A Tiny Attack Surface](https://ricterz.me/posts/Xdebug%3A%20A%20Tiny%20Attack%20Surface)
19+
+ [Exploitable PHP functions](https://stackoverflow.com/questions/3115559/exploitable-php-functions)
20+
+ SSRF:
21+
+ [SSRF(服务器端请求伪造)测试资源](https://paper.seebug.org/393/)
22+
+ 代码执行:
23+
+ [从PHP源码与扩展开发谈PHP任意代码执行与防御](https://blog.zsxsoft.com/post/30)
24+
+ 杂:
25+
+ [High-Level Approaches for Finding Vulnerabilities](http://jackson.thuraisamy.me/finding-vulnerabilities.html)
2626

2727
<!-- more -->
2828
# Web Security
@@ -79,12 +79,14 @@
7979
+ [跨站的艺术-XSS入门与介绍](http://www.fooying.com/the-art-of-xss-1-introduction/)
8080
+ [Content Security Policy 入门教程](https://jaq.alibaba.com/community/art/show?spm=a313e.7916646.24000001.49.ZP8rXN&articleid=518)
8181
+ [LoRexxar-CSP](http://lorexxar.cn/tags/csp/)
82+
+ [如何绕过Edge、Chrome和Safari的内容安全策略](http://bobao.360.cn/learning/detail/4406.html)
8283
+ [XSS小记](https://xianzhi.aliyun.com/forum/read/196.html?fpage=7)
8384
+ [DOMXSS Wiki](https://github.com/wisec/domxsswiki/wiki)
8485
+ [XSS Bypass Cookbook](https://xianzhi.aliyun.com/forum/read/536.html?fpage=7)
8586
+ [从瑞士军刀到变形金刚--XSS攻击面拓展](https://xianzhi.aliyun.com/forum/read/1988.html)
8687
+ [我们要在任何可能的地方测试XSS漏洞 ](http://www.freebuf.com/vuls/142751.html)
8788
+ [Alternative to Javascript Pseudo-Protocol](http://brutelogic.com.br/blog/alternative-javascript-pseudo-protocol/)
89+
+ [妙用JavaScript绕过XSS过滤](http://bobao.360.cn/learning/detail/4414.html)
8890
+ [Bypassing CSP using polyglot JPEGs ](http://blog.portswigger.net/2016/12/bypassing-csp-using-polyglot-jpegs.html)
8991
+ [Bypass unsafe-inline mode CSP](http://paper.seebug.org/91/)
9092
+ [Chrome XSS Auditor – SVG Bypass](https://brutelogic.com.br/blog/chrome-xss-auditor-svg-bypass/)
@@ -105,6 +107,7 @@
105107
+ [利用XSS和CSRF漏洞远程实现PayPal合作方网站未授权账户访问](http://www.freebuf.com/vuls/144893.html)
106108
+ [Modern Alchemy: Turning XSS into RCE](https://blog.doyensec.com/2017/08/03/electron-framework-security.html)
107109
+ [先知XSS挑战赛 - L3m0n Writeup](https://mp.weixin.qq.com/s/d_UCJusUdWCRTo3Vutsk_A)
110+
+ [SheepSec: 7 Reflected Cross-site Scripting (XSS) Examples](http://sheepsec.com/blog/7-reflected-xss.html)
108111

109112
### CSRF
110113
+ [用代码来细说Csrf漏洞危害以及防御](https://bbs.ichunqiu.com/thread-24127-1-1.html?from=sec)
@@ -114,11 +117,13 @@
114117
+ [浅谈Session机制及CSRF攻防 ](https://mp.weixin.qq.com/s/aID_N9bgq91EM26qVSVBXw)
115118

116119
### 其他
120+
+ [JavaScript Dangerous Functions (Part 1) - HTML Manipulation ](http://blog.blueclosure.com/2017/09/javascript-dangerous-functions-part-1.html)
117121
+ [safari本地文件读取漏洞之扩展攻击面](http://www.wupco.cn/?p=4134)
118122
+ [利用脚本注入漏洞攻击ReactJS应用程序](http://www.freebuf.com/articles/web/144988.html)
119123
+ [当代 Web 的 JSON 劫持技巧](http://paper.seebug.org/130/?from=timeline&isappinstalled=0)
120124

121125
## SSRF
126+
+ [SSRF(服务器端请求伪造)测试资源](https://paper.seebug.org/393/)
122127
+ [Build Your SSRF Exploit Framework SSRF](http://docs.ioin.in/writeup/fuzz.wuyun.org/_src_build_your_ssrf_exp_autowork_pdf/index.pdf)
123128
+ [SSRF攻击实例解析](http://www.freebuf.com/articles/web/20407.html)
124129
+ [SSRF漏洞分析与利用](http://www.4o4notfound.org/index.php/author/1/)
@@ -175,9 +180,10 @@
175180
+ [Exploiting Python Code Injection in Web Applications](https://sethsec.blogspot.jp/2016/11/exploiting-python-code-injection-in-web.html)
176181
+ [利用 Python 特性在 Jinja2 模板中执行任意代码](http://rickgray.me/2016/02/24/use-python-features-to-execute-arbitrary-codes-in-jinja2-templates.html)
177182
+ [Python 模板字符串与模板注入](https://virusdefender.net/index.php/archives/761/)
178-
183+
+ [Ruby ERB Template Injection](https://www.trustedsec.com/2017/09/rubyerb-template-injection/)
179184

180185
## 代码执行
186+
+ [从PHP源码与扩展开发谈PHP任意代码执行与防御](https://blog.zsxsoft.com/post/30)
181187
+ [Command Injection/Shell Injection](https://www.exploit-db.com/docs/42593.pdf)
182188
+ [PHP Code Injection Analysis](http://www.polaris-lab.com/index.php/archives/254/)
183189
+ [ 利用环境变量LD_PRELOAD来绕过php disable_function执行系统命令](http://doc.ph0en1x.com/wooyun_drops/%E5%88%A9%E7%94%A8%E7%8E%AF%E5%A2%83%E5%8F%98%E9%87%8FLD_PRELOAD%E6%9D%A5%E7%BB%95%E8%BF%87php%20disable_function%E6%89%A7%E8%A1%8C%E7%B3%BB%E7%BB%9F%E5%91%BD%E4%BB%A4.html)
@@ -275,13 +281,16 @@
275281
+ [PHP Email Injection Example](http://resources.infosecinstitute.com/email-injection/)
276282

277283
### 其他
284+
+ [Xdebug: A Tiny Attack Surface](https://ricterz.me/posts/Xdebug%3A%20A%20Tiny%20Attack%20Surface)
285+
+ [Exploitable PHP functions](https://stackoverflow.com/questions/3115559/exploitable-php-functions)
278286
+ [从WordPress SQLi谈PHP格式化字符串问题](https://paper.seebug.org/386/)
279287
+ [php & apache2 &操作系统之间的一些黑魔法](http://wonderkun.cc/index.html/?p=626)
280288
+ [php内存破坏漏洞exp编写和禁用函数绕过](http://blog.th3s3v3n.xyz/2016/05/01/bin/2016-5-1-php%E5%86%85%E5%AD%98%E7%A0%B4%E5%9D%8F%E6%BC%8F%E6%B4%9Eexp%E7%BC%96%E5%86%99%E5%92%8C%E7%A6%81%E7%94%A8%E5%87%BD%E6%95%B0%E7%BB%95%E8%BF%87/)
281289
+ [挖掘PHP禁用函数绕过利用姿势](http://blog.th3s3v3n.xyz/2016/11/20/web/%E6%8C%96%E6%8E%98PHP%E7%A6%81%E7%94%A8%E5%87%BD%E6%95%B0%E7%BB%95%E8%BF%87%E5%88%A9%E7%94%A8%E5%A7%BF%E5%8A%BF/)
282290
+ [.user.ini文件构成的PHP后门](http://wooyun.jozxing.cc/static/drops/tips-3424.html)
283291

284292
### php代码审计
293+
+ [PHP漏洞挖掘——进阶篇](http://blog.nsfocus.net/php-vulnerability-mining/)
285294
+ [论PHP常见的漏洞](http://wooyun.jozxing.cc/static/drops/papers-4544.html)
286295
+ [浅谈代码审计入门实战:某博客系统最新版审计之旅 ](http://www.freebuf.com/articles/rookie/143554.html)
287296
+ [ctf中的php代码审计技巧](http://www.am0s.com/ctf/200.html)
@@ -461,11 +470,12 @@
461470
+ [rcoil:CTF线下攻防赛总结](http://rcoil.me/2017/06/CTF%E7%BA%BF%E4%B8%8B%E8%B5%9B%E6%80%BB%E7%BB%93/)
462471

463472
#
473+
+ [High-Level Approaches for Finding Vulnerabilities](http://jackson.thuraisamy.me/finding-vulnerabilities.html)
464474
+ [谈谈HTML5本地存储——WebStorage](http://syean.cn/2017/08/15/%E8%B0%88%E8%B0%88HTML5%E6%9C%AC%E5%9C%B0%E5%AD%98%E5%82%A8%E2%80%94%E2%80%94WebStorage/)
465475
+ [Linux下容易被忽视的那些命令用法](https://segmentfault.com/p/1210000010668099/read)
466476
+ [各种脚本语言不同版本一句话开启 HTTP 服务器的总结](http://www.mottoin.com/94895.html)
467477
+ [WebAssembly入门:将字节码带入Web世界](http://bobao.360.cn/learning/detail/3757.html)
468478
+ [phpwind 利用哈希长度扩展攻击进行getshell](https://www.leavesongs.com/PENETRATION/phpwind-hash-length-extension-attack.html)
469479
+ [深入理解hash长度扩展攻击(sha1为例) ](http://www.freebuf.com/articles/web/69264.html)
470480
+ [Joomla 框架的程序执行流程及目录结构分析](http://bobao.360.cn/learning/detail/3909.html)
471-
+ [如何通过恶意插件在Atom中植入后门](http://bobao.360.cn/learning/detail/4268.html)
481+
+ [如何通过恶意插件在Atom中植入后门](http://bobao.360.cn/learning/detail/4268.html)

0 commit comments

Comments
 (0)