|
1 | 1 | # [Web-Security-Learning](https://chybeta.github.io/2017/08/19/Web-Security-Learning/) |
2 | 2 |
|
3 | 3 | 在学习Web安全的过程中整合的一些资料。 |
4 | | -该repo会不断更新,最近更新日期为:2017/9/12。 |
| 4 | +该repo会不断更新,最近更新日期为:2017/9/19。 |
5 | 5 |
|
6 | 6 | 同步更新于: [chybeta: Web-Security-Learning (带目录) ](https://chybeta.github.io/2017/08/19/Web-Security-Learning/) |
7 | 7 |
|
8 | | -9月12日更新: |
| 8 | +9月19日更新: |
9 | 9 | + 新收录文章: |
10 | | - + 渗透技巧: |
11 | | - + [谈谈端口探测的经验与原理](http://www.freebuf.com/articles/network/146087.html) |
12 | | - + [乙方渗透测试之Fuzz爆破](http://www.cnnetarmy.com/%E4%B9%99%E6%96%B9%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E4%B9%8BFuzz%E7%88%86%E7%A0%B4/) |
13 | | - + 渗透实战; |
14 | | - + [渗透测试学习笔记之案例四](http://avfisher.win/archives/784) |
15 | | - + [记一次内网渗透](http://killbit.me/2017/09/11/%E8%AE%B0%E4%B8%80%E6%AC%A1%E5%86%85%E7%BD%91%E6%B8%97%E9%80%8F/) |
16 | | - + XSS: |
17 | | - + [XSS Without Dots](https://markitzeroday.com/character-restrictions/xss/2017/07/26/xss-without-dots.html) |
18 | | - + XXE: |
19 | | - + [XML? Be cautious!](https://blog.pragmatists.com/xml-be-cautious-69a981fdc56a) |
20 | | - + SSRF: |
21 | | - + [Use DNS Rebinding to Bypass SSRF in Java](https://mp.weixin.qq.com/s?__biz=MzIzOTQ5NjUzOQ==&mid=2247483742&idx=1&sn=e7265d5351a6d9ed30d90be1c17be041) |
| 10 | + + 前端安全: |
| 11 | + + [妙用JavaScript绕过XSS过滤](http://bobao.360.cn/learning/detail/4414.html) |
| 12 | + + [如何绕过Edge、Chrome和Safari的内容安全策略](http://bobao.360.cn/learning/detail/4406.html) |
| 13 | + + [SheepSec: 7 Reflected Cross-site Scripting (XSS) Examples](http://sheepsec.com/blog/7-reflected-xss.html) |
| 14 | + + [JavaScript Dangerous Functions (Part 1) - HTML Manipulation ](http://blog.blueclosure.com/2017/09/javascript-dangerous-functions-part-1.html) |
| 15 | + + SSTI: |
| 16 | + + [Ruby ERB Template Injection](https://www.trustedsec.com/2017/09/rubyerb-template-injection/) |
22 | 17 | + PHP: |
23 | | - + [从WordPress SQLi谈PHP格式化字符串问题](https://paper.seebug.org/386/) |
24 | | - + python-Web: |
25 | | - + [Exploiting Python Deserialization Vulnerabilities](https://crowdshield.com/blog.php?name=exploiting-python-deserialization-vulnerabilities) |
| 18 | + + [Xdebug: A Tiny Attack Surface](https://ricterz.me/posts/Xdebug%3A%20A%20Tiny%20Attack%20Surface) |
| 19 | + + [Exploitable PHP functions](https://stackoverflow.com/questions/3115559/exploitable-php-functions) |
| 20 | + + SSRF: |
| 21 | + + [SSRF(服务器端请求伪造)测试资源](https://paper.seebug.org/393/) |
| 22 | + + 代码执行: |
| 23 | + + [从PHP源码与扩展开发谈PHP任意代码执行与防御](https://blog.zsxsoft.com/post/30) |
| 24 | + + 杂: |
| 25 | + + [High-Level Approaches for Finding Vulnerabilities](http://jackson.thuraisamy.me/finding-vulnerabilities.html) |
26 | 26 |
|
27 | 27 | <!-- more --> |
28 | 28 | # Web Security |
|
79 | 79 | + [跨站的艺术-XSS入门与介绍](http://www.fooying.com/the-art-of-xss-1-introduction/) |
80 | 80 | + [Content Security Policy 入门教程](https://jaq.alibaba.com/community/art/show?spm=a313e.7916646.24000001.49.ZP8rXN&articleid=518) |
81 | 81 | + [LoRexxar-CSP](http://lorexxar.cn/tags/csp/) |
| 82 | ++ [如何绕过Edge、Chrome和Safari的内容安全策略](http://bobao.360.cn/learning/detail/4406.html) |
82 | 83 | + [XSS小记](https://xianzhi.aliyun.com/forum/read/196.html?fpage=7) |
83 | 84 | + [DOMXSS Wiki](https://github.com/wisec/domxsswiki/wiki) |
84 | 85 | + [XSS Bypass Cookbook](https://xianzhi.aliyun.com/forum/read/536.html?fpage=7) |
85 | 86 | + [从瑞士军刀到变形金刚--XSS攻击面拓展](https://xianzhi.aliyun.com/forum/read/1988.html) |
86 | 87 | + [我们要在任何可能的地方测试XSS漏洞 ](http://www.freebuf.com/vuls/142751.html) |
87 | 88 | + [Alternative to Javascript Pseudo-Protocol](http://brutelogic.com.br/blog/alternative-javascript-pseudo-protocol/) |
| 89 | ++ [妙用JavaScript绕过XSS过滤](http://bobao.360.cn/learning/detail/4414.html) |
88 | 90 | + [Bypassing CSP using polyglot JPEGs ](http://blog.portswigger.net/2016/12/bypassing-csp-using-polyglot-jpegs.html) |
89 | 91 | + [Bypass unsafe-inline mode CSP](http://paper.seebug.org/91/) |
90 | 92 | + [Chrome XSS Auditor – SVG Bypass](https://brutelogic.com.br/blog/chrome-xss-auditor-svg-bypass/) |
|
105 | 107 | + [利用XSS和CSRF漏洞远程实现PayPal合作方网站未授权账户访问](http://www.freebuf.com/vuls/144893.html) |
106 | 108 | + [Modern Alchemy: Turning XSS into RCE](https://blog.doyensec.com/2017/08/03/electron-framework-security.html) |
107 | 109 | + [先知XSS挑战赛 - L3m0n Writeup](https://mp.weixin.qq.com/s/d_UCJusUdWCRTo3Vutsk_A) |
| 110 | ++ [SheepSec: 7 Reflected Cross-site Scripting (XSS) Examples](http://sheepsec.com/blog/7-reflected-xss.html) |
108 | 111 |
|
109 | 112 | ### CSRF |
110 | 113 | + [用代码来细说Csrf漏洞危害以及防御](https://bbs.ichunqiu.com/thread-24127-1-1.html?from=sec) |
|
114 | 117 | + [浅谈Session机制及CSRF攻防 ](https://mp.weixin.qq.com/s/aID_N9bgq91EM26qVSVBXw) |
115 | 118 |
|
116 | 119 | ### 其他 |
| 120 | ++ [JavaScript Dangerous Functions (Part 1) - HTML Manipulation ](http://blog.blueclosure.com/2017/09/javascript-dangerous-functions-part-1.html) |
117 | 121 | + [safari本地文件读取漏洞之扩展攻击面](http://www.wupco.cn/?p=4134) |
118 | 122 | + [利用脚本注入漏洞攻击ReactJS应用程序](http://www.freebuf.com/articles/web/144988.html) |
119 | 123 | + [当代 Web 的 JSON 劫持技巧](http://paper.seebug.org/130/?from=timeline&isappinstalled=0) |
120 | 124 |
|
121 | 125 | ## SSRF |
| 126 | ++ [SSRF(服务器端请求伪造)测试资源](https://paper.seebug.org/393/) |
122 | 127 | + [Build Your SSRF Exploit Framework SSRF](http://docs.ioin.in/writeup/fuzz.wuyun.org/_src_build_your_ssrf_exp_autowork_pdf/index.pdf) |
123 | 128 | + [SSRF攻击实例解析](http://www.freebuf.com/articles/web/20407.html) |
124 | 129 | + [SSRF漏洞分析与利用](http://www.4o4notfound.org/index.php/author/1/) |
|
175 | 180 | + [Exploiting Python Code Injection in Web Applications](https://sethsec.blogspot.jp/2016/11/exploiting-python-code-injection-in-web.html) |
176 | 181 | + [利用 Python 特性在 Jinja2 模板中执行任意代码](http://rickgray.me/2016/02/24/use-python-features-to-execute-arbitrary-codes-in-jinja2-templates.html) |
177 | 182 | + [Python 模板字符串与模板注入](https://virusdefender.net/index.php/archives/761/) |
178 | | - |
| 183 | ++ [Ruby ERB Template Injection](https://www.trustedsec.com/2017/09/rubyerb-template-injection/) |
179 | 184 |
|
180 | 185 | ## 代码执行 |
| 186 | ++ [从PHP源码与扩展开发谈PHP任意代码执行与防御](https://blog.zsxsoft.com/post/30) |
181 | 187 | + [Command Injection/Shell Injection](https://www.exploit-db.com/docs/42593.pdf) |
182 | 188 | + [PHP Code Injection Analysis](http://www.polaris-lab.com/index.php/archives/254/) |
183 | 189 | + [ 利用环境变量LD_PRELOAD来绕过php disable_function执行系统命令](http://doc.ph0en1x.com/wooyun_drops/%E5%88%A9%E7%94%A8%E7%8E%AF%E5%A2%83%E5%8F%98%E9%87%8FLD_PRELOAD%E6%9D%A5%E7%BB%95%E8%BF%87php%20disable_function%E6%89%A7%E8%A1%8C%E7%B3%BB%E7%BB%9F%E5%91%BD%E4%BB%A4.html) |
|
275 | 281 | + [PHP Email Injection Example](http://resources.infosecinstitute.com/email-injection/) |
276 | 282 |
|
277 | 283 | ### 其他 |
| 284 | ++ [Xdebug: A Tiny Attack Surface](https://ricterz.me/posts/Xdebug%3A%20A%20Tiny%20Attack%20Surface) |
| 285 | ++ [Exploitable PHP functions](https://stackoverflow.com/questions/3115559/exploitable-php-functions) |
278 | 286 | + [从WordPress SQLi谈PHP格式化字符串问题](https://paper.seebug.org/386/) |
279 | 287 | + [php & apache2 &操作系统之间的一些黑魔法](http://wonderkun.cc/index.html/?p=626) |
280 | 288 | + [php内存破坏漏洞exp编写和禁用函数绕过](http://blog.th3s3v3n.xyz/2016/05/01/bin/2016-5-1-php%E5%86%85%E5%AD%98%E7%A0%B4%E5%9D%8F%E6%BC%8F%E6%B4%9Eexp%E7%BC%96%E5%86%99%E5%92%8C%E7%A6%81%E7%94%A8%E5%87%BD%E6%95%B0%E7%BB%95%E8%BF%87/) |
281 | 289 | + [挖掘PHP禁用函数绕过利用姿势](http://blog.th3s3v3n.xyz/2016/11/20/web/%E6%8C%96%E6%8E%98PHP%E7%A6%81%E7%94%A8%E5%87%BD%E6%95%B0%E7%BB%95%E8%BF%87%E5%88%A9%E7%94%A8%E5%A7%BF%E5%8A%BF/) |
282 | 290 | + [.user.ini文件构成的PHP后门](http://wooyun.jozxing.cc/static/drops/tips-3424.html) |
283 | 291 |
|
284 | 292 | ### php代码审计 |
| 293 | ++ [PHP漏洞挖掘——进阶篇](http://blog.nsfocus.net/php-vulnerability-mining/) |
285 | 294 | + [论PHP常见的漏洞](http://wooyun.jozxing.cc/static/drops/papers-4544.html) |
286 | 295 | + [浅谈代码审计入门实战:某博客系统最新版审计之旅 ](http://www.freebuf.com/articles/rookie/143554.html) |
287 | 296 | + [ctf中的php代码审计技巧](http://www.am0s.com/ctf/200.html) |
|
461 | 470 | + [rcoil:CTF线下攻防赛总结](http://rcoil.me/2017/06/CTF%E7%BA%BF%E4%B8%8B%E8%B5%9B%E6%80%BB%E7%BB%93/) |
462 | 471 |
|
463 | 472 | # 杂 |
| 473 | ++ [High-Level Approaches for Finding Vulnerabilities](http://jackson.thuraisamy.me/finding-vulnerabilities.html) |
464 | 474 | + [谈谈HTML5本地存储——WebStorage](http://syean.cn/2017/08/15/%E8%B0%88%E8%B0%88HTML5%E6%9C%AC%E5%9C%B0%E5%AD%98%E5%82%A8%E2%80%94%E2%80%94WebStorage/) |
465 | 475 | + [Linux下容易被忽视的那些命令用法](https://segmentfault.com/p/1210000010668099/read) |
466 | 476 | + [各种脚本语言不同版本一句话开启 HTTP 服务器的总结](http://www.mottoin.com/94895.html) |
467 | 477 | + [WebAssembly入门:将字节码带入Web世界](http://bobao.360.cn/learning/detail/3757.html) |
468 | 478 | + [phpwind 利用哈希长度扩展攻击进行getshell](https://www.leavesongs.com/PENETRATION/phpwind-hash-length-extension-attack.html) |
469 | 479 | + [深入理解hash长度扩展攻击(sha1为例) ](http://www.freebuf.com/articles/web/69264.html) |
470 | 480 | + [Joomla 框架的程序执行流程及目录结构分析](http://bobao.360.cn/learning/detail/3909.html) |
471 | | -+ [如何通过恶意插件在Atom中植入后门](http://bobao.360.cn/learning/detail/4268.html) |
| 481 | ++ [如何通过恶意插件在Atom中植入后门](http://bobao.360.cn/learning/detail/4268.html) |
0 commit comments