|
4 | 4 | 该repo会不断更新,最近更新日期为:2017/10/04。 |
5 | 5 |
|
6 | 6 | 同步更新于: [chybeta: Web-Security-Learning (带目录) ](https://chybeta.github.io/2017/08/19/Web-Security-Learning/) |
7 | | - |
8 | | -10月04日更新: |
| 7 | +10月15日更新: |
9 | 8 | + 新收录文章: |
10 | | - + 运维: |
11 | | - + [Apache server security: 10 tips to secure installation](https://www.acunetix.com/blog/articles/10-tips-secure-apache-installation/) |
| 9 | + + 文件包含 |
| 10 | + + [php文件包含漏洞 ](https://chybeta.github.io/2017/10/08/php%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E/) |
| 11 | + + 随机数问题: |
| 12 | + + [PHP mt_rand()随机数安全 ](https://mp.weixin.qq.com/s/3TgBKXHw3MC61qIYELanJg) |
| 13 | + + PHP其他: |
| 14 | + + [Decrypt PHP's eval based encryption with debugger ](https://mp.weixin.qq.com/s?__biz=MzIxNjU3ODMyOQ==&mid=2247483693&idx=1&sn=ed49fc13d8e09f12d87675adff18919f) |
| 15 | + + python-Web |
| 16 | + + [python web 安全总结](http://bobao.360.cn/learning/detail/4522.html) |
| 17 | + + ctf技巧总结 |
| 18 | + + [CTF线下防御战 — 让你的靶机变成“铜墙铁壁”](http://bobao.360.cn/ctf/detail/210.html) |
12 | 19 | |
13 | 20 | <!-- more --> |
| 21 | +# Web-Security-Learning |
| 22 | +项目地址:[Web-Security-Learning](https://github.com/CHYbeta/Web-Security-Learning) |
| 23 | + |
14 | 24 | # Web Security |
15 | 25 |
|
16 | 26 | ## sql注入 |
|
44 | 54 | + [SQL注入之骚姿势小记](https://mp.weixin.qq.com/s/ORsciwsBGQJhFdKqceprSw) |
45 | 55 | + [CTF比赛中SQL注入的一些经验总结 ](http://www.freebuf.com/articles/web/137094.html) |
46 | 56 | + [如何绕过WAF/NGWAF的libinjection实现SQL注入](http://bobao.360.cn/learning/detail/3855.html) |
47 | | -+ [HackMe-SQL-Injection-Challenges](https://github.com/breakthenet/HackMe-SQL-Injection-Challenges) |
| 57 | ++ [HackMe-SQL-Injection-Challenges |
| 58 | +](https://github.com/breakthenet/HackMe-SQL-Injection-Challenges) |
48 | 59 | + [绕过WAF注入](https://bbs.ichunqiu.com/thread-25397-1-1.html?from=sec) |
49 | 60 | + [bypassGET和POST的注入防御思路分享](https://bbs.ichunqiu.com/thread-16134-1-1.html?from=sec) |
50 | 61 | + [SQL注入的常规思路及奇葩技巧 ](https://mp.weixin.qq.com/s/hBkJ1M6LRgssNyQyati1ng) |
|
106 | 117 | + [浅谈Session机制及CSRF攻防 ](https://mp.weixin.qq.com/s/aID_N9bgq91EM26qVSVBXw) |
107 | 118 |
|
108 | 119 | ### 其他 |
109 | | -+ [【脉搏沉淀系列】未授权访问漏洞总结](https://www.secpulse.com/archives/61101.html) |
| 120 | ++ [HTML中,闭合优先的神奇标签 ](https://mp.weixin.qq.com/s?__biz=MzA4MDA1NDE3Mw==&mid=2647715481&idx=1&sn=a4d930d5a944a5a6c0361a3c6c57d3d5) |
110 | 121 | + [JavaScript Dangerous Functions (Part 1) - HTML Manipulation ](http://blog.blueclosure.com/2017/09/javascript-dangerous-functions-part-1.html) |
111 | 122 | + [safari本地文件读取漏洞之扩展攻击面](http://www.wupco.cn/?p=4134) |
112 | 123 | + [利用脚本注入漏洞攻击ReactJS应用程序](http://www.freebuf.com/articles/web/144988.html) |
|
149 | 160 | + [神奇的Content-Type——在JSON中玩转XXE攻击](http://bobao.360.cn/learning/detail/360.html) |
150 | 161 | + [XXE-DTD Cheat Sheet](https://web-in-security.blogspot.jp/2016/03/xxe-cheat-sheet.html) |
151 | 162 | + [XML? Be cautious!](https://blog.pragmatists.com/xml-be-cautious-69a981fdc56a) |
| 163 | ++ [XSLT Server Side Injection Attacks](https://www.contextis.com/blog/xslt-server-side-injection-attacks) |
152 | 164 |
|
153 | 165 | ## JSONP注入 |
154 | 166 | + [JSONP注入解析 ](http://www.freebuf.com/articles/web/126347.html) |
|
185 | 197 | + [正则表达式使用不当引发的系统命令执行漏洞](http://bobao.360.cn/learning/detail/3609.html) |
186 | 198 |
|
187 | 199 | ## 文件包含 |
| 200 | ++ [php文件包含漏洞 ](https://chybeta.github.io/2017/10/08/php%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E/) |
188 | 201 | + [Turning LFI into RFI](https://l.avala.mp/?p=241) |
189 | 202 | + [PHP文件包含漏洞总结](http://wooyun.jozxing.cc/static/drops/tips-3827.html) |
190 | 203 | + [常见文件包含发生场景与防御](http://bobao.360.cn/learning/detail/3873.html) |
|
220 | 233 | + [tom0li: 逻辑漏洞小结](https://tom0li.github.io/2017/07/17/%E9%80%BB%E8%BE%91%E6%BC%8F%E6%B4%9E%E5%B0%8F%E7%BB%93/) |
221 | 234 |
|
222 | 235 | ## 其他漏洞 |
| 236 | ++ [未授权访问漏洞总结](https://www.secpulse.com/archives/61101.html) |
223 | 237 | + [Web之困笔记](http://www.au1ge.xyz/2017/08/09/web%E4%B9%8B%E5%9B%B0%E7%AC%94%E8%AE%B0/) |
224 | 238 | + [常见Web源码泄露总结](http://www.mottoin.com/95749.html) |
225 | 239 | + [Github信息泄露升级版案例](http://www.ms509.com/?p=718) |
|
248 | 262 | + [php比较操作符的安全问题](http://wooyun.jozxing.cc/static/drops/tips-7679.html) |
249 | 263 |
|
250 | 264 | ### 随机数问题 |
| 265 | ++ [PHP mt_rand()随机数安全 ](https://mp.weixin.qq.com/s/3TgBKXHw3MC61qIYELanJg) |
251 | 266 | + [Cracking PHP rand()](http://www.sjoerdlangkemper.nl/2016/02/11/cracking-php-rand/) |
252 | 267 | + [php里的随机数](http://5alt.me/2017/06/php%E9%87%8C%E7%9A%84%E9%9A%8F%E6%9C%BA%E6%95%B0/) |
253 | 268 | + [php_mt_seed - PHP mt_rand() seed cracker](http://www.openwall.com/php_mt_seed/) |
|
272 | 287 | + [PHP Email Injection Example](http://resources.infosecinstitute.com/email-injection/) |
273 | 288 |
|
274 | 289 | ### 其他 |
| 290 | ++ [Decrypt PHP's eval based encryption with debugger ](https://mp.weixin.qq.com/s?__biz=MzIxNjU3ODMyOQ==&mid=2247483693&idx=1&sn=ed49fc13d8e09f12d87675adff18919f) |
275 | 291 | + [Upgrade from LFI to RCE via PHP Sessions](https://www.rcesecurity.com/2017/08/from-lfi-to-rce-via-php-sessions/) |
276 | 292 | + [Xdebug: A Tiny Attack Surface](https://ricterz.me/posts/Xdebug%3A%20A%20Tiny%20Attack%20Surface) |
277 | 293 | + [Exploitable PHP functions](https://stackoverflow.com/questions/3115559/exploitable-php-functions) |
|
324 | 340 |
|
325 | 341 |
|
326 | 342 | ## python-Web |
| 343 | ++ [python web 安全总结](http://bobao.360.cn/learning/detail/4522.html) |
327 | 344 | + [Defencely Clarifies Python Object Injection Exploitation](http://defencely.com/blog/defencely-clarifies-python-object-injection-exploitation/) |
328 | 345 | + [Exploiting Python Deserialization Vulnerabilities](https://crowdshield.com/blog.php?name=exploiting-python-deserialization-vulnerabilities) |
329 | 346 | + [Explaining and exploiting deserialization vulnerability with Python(EN)](https://dan.lousqui.fr/explaining-and-exploiting-deserialization-vulnerability-with-python-en.html) |
|
461 | 478 |
|
462 | 479 | # CTF |
463 | 480 | ## 技巧总结 |
| 481 | ++ [CTF线下防御战 — 让你的靶机变成“铜墙铁壁”](http://bobao.360.cn/ctf/detail/210.html) |
464 | 482 | + [ctf-wiki](https://ctf-wiki.github.io/ctf-wiki/#/introduction) |
465 | 483 | + [CTF中那些脑洞大开的编码和加密](https://www.hackfun.org/CTF/coding-and-encryption-of-those-brain-holes-in-CTF.html) |
466 | 484 | + [CTF加密与解密 ](http://thief.one/2017/06/13/1/) |
|
0 commit comments