Skip to content

Commit a793084

Browse files
committed
Updates README.md
Auto commit by GitBook Editor
1 parent 3a1561f commit a793084

File tree

1 file changed

+24
-6
lines changed

1 file changed

+24
-6
lines changed

README.md

Lines changed: 24 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,23 @@
44
该repo会不断更新,最近更新日期为:2017/10/04。
55

66
同步更新于: [chybeta: Web-Security-Learning (带目录) ](https://chybeta.github.io/2017/08/19/Web-Security-Learning/)
7-
8-
10月04日更新:
7+
10月15日更新:
98
+ 新收录文章:
10-
+ 运维:
11-
+ [Apache server security: 10 tips to secure installation](https://www.acunetix.com/blog/articles/10-tips-secure-apache-installation/)
9+
+ 文件包含
10+
+ [php文件包含漏洞 ](https://chybeta.github.io/2017/10/08/php%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E/)
11+
+ 随机数问题:
12+
+ [PHP mt_rand()随机数安全 ](https://mp.weixin.qq.com/s/3TgBKXHw3MC61qIYELanJg)
13+
+ PHP其他:
14+
+ [Decrypt PHP's eval based encryption with debugger ](https://mp.weixin.qq.com/s?__biz=MzIxNjU3ODMyOQ==&mid=2247483693&idx=1&sn=ed49fc13d8e09f12d87675adff18919f)
15+
+ python-Web
16+
+ [python web 安全总结](http://bobao.360.cn/learning/detail/4522.html)
17+
+ ctf技巧总结
18+
+ [CTF线下防御战 — 让你的靶机变成“铜墙铁壁”](http://bobao.360.cn/ctf/detail/210.html)
1219
1320
<!-- more -->
21+
# Web-Security-Learning
22+
项目地址:[Web-Security-Learning](https://github.com/CHYbeta/Web-Security-Learning)
23+
1424
# Web Security
1525

1626
## sql注入
@@ -44,7 +54,8 @@
4454
+ [SQL注入之骚姿势小记](https://mp.weixin.qq.com/s/ORsciwsBGQJhFdKqceprSw)
4555
+ [CTF比赛中SQL注入的一些经验总结 ](http://www.freebuf.com/articles/web/137094.html)
4656
+ [如何绕过WAF/NGWAF的libinjection实现SQL注入](http://bobao.360.cn/learning/detail/3855.html)
47-
+ [HackMe-SQL-Injection-Challenges](https://github.com/breakthenet/HackMe-SQL-Injection-Challenges)
57+
+ [HackMe-SQL-Injection-Challenges
58+
](https://github.com/breakthenet/HackMe-SQL-Injection-Challenges)
4859
+ [绕过WAF注入](https://bbs.ichunqiu.com/thread-25397-1-1.html?from=sec)
4960
+ [bypassGET和POST的注入防御思路分享](https://bbs.ichunqiu.com/thread-16134-1-1.html?from=sec)
5061
+ [SQL注入的常规思路及奇葩技巧 ](https://mp.weixin.qq.com/s/hBkJ1M6LRgssNyQyati1ng)
@@ -106,7 +117,7 @@
106117
+ [浅谈Session机制及CSRF攻防 ](https://mp.weixin.qq.com/s/aID_N9bgq91EM26qVSVBXw)
107118

108119
### 其他
109-
+ [【脉搏沉淀系列】未授权访问漏洞总结](https://www.secpulse.com/archives/61101.html)
120+
+ [HTML中,闭合优先的神奇标签 ](https://mp.weixin.qq.com/s?__biz=MzA4MDA1NDE3Mw==&mid=2647715481&idx=1&sn=a4d930d5a944a5a6c0361a3c6c57d3d5)
110121
+ [JavaScript Dangerous Functions (Part 1) - HTML Manipulation ](http://blog.blueclosure.com/2017/09/javascript-dangerous-functions-part-1.html)
111122
+ [safari本地文件读取漏洞之扩展攻击面](http://www.wupco.cn/?p=4134)
112123
+ [利用脚本注入漏洞攻击ReactJS应用程序](http://www.freebuf.com/articles/web/144988.html)
@@ -149,6 +160,7 @@
149160
+ [神奇的Content-Type——在JSON中玩转XXE攻击](http://bobao.360.cn/learning/detail/360.html)
150161
+ [XXE-DTD Cheat Sheet](https://web-in-security.blogspot.jp/2016/03/xxe-cheat-sheet.html)
151162
+ [XML? Be cautious!](https://blog.pragmatists.com/xml-be-cautious-69a981fdc56a)
163+
+ [XSLT Server Side Injection Attacks](https://www.contextis.com/blog/xslt-server-side-injection-attacks)
152164

153165
## JSONP注入
154166
+ [JSONP注入解析 ](http://www.freebuf.com/articles/web/126347.html)
@@ -185,6 +197,7 @@
185197
+ [正则表达式使用不当引发的系统命令执行漏洞](http://bobao.360.cn/learning/detail/3609.html)
186198

187199
## 文件包含
200+
+ [php文件包含漏洞 ](https://chybeta.github.io/2017/10/08/php%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E/)
188201
+ [Turning LFI into RFI](https://l.avala.mp/?p=241)
189202
+ [PHP文件包含漏洞总结](http://wooyun.jozxing.cc/static/drops/tips-3827.html)
190203
+ [常见文件包含发生场景与防御](http://bobao.360.cn/learning/detail/3873.html)
@@ -220,6 +233,7 @@
220233
+ [tom0li: 逻辑漏洞小结](https://tom0li.github.io/2017/07/17/%E9%80%BB%E8%BE%91%E6%BC%8F%E6%B4%9E%E5%B0%8F%E7%BB%93/)
221234

222235
## 其他漏洞
236+
+ [未授权访问漏洞总结](https://www.secpulse.com/archives/61101.html)
223237
+ [Web之困笔记](http://www.au1ge.xyz/2017/08/09/web%E4%B9%8B%E5%9B%B0%E7%AC%94%E8%AE%B0/)
224238
+ [常见Web源码泄露总结](http://www.mottoin.com/95749.html)
225239
+ [Github信息泄露升级版案例](http://www.ms509.com/?p=718)
@@ -248,6 +262,7 @@
248262
+ [php比较操作符的安全问题](http://wooyun.jozxing.cc/static/drops/tips-7679.html)
249263

250264
### 随机数问题
265+
+ [PHP mt_rand()随机数安全 ](https://mp.weixin.qq.com/s/3TgBKXHw3MC61qIYELanJg)
251266
+ [Cracking PHP rand()](http://www.sjoerdlangkemper.nl/2016/02/11/cracking-php-rand/)
252267
+ [php里的随机数](http://5alt.me/2017/06/php%E9%87%8C%E7%9A%84%E9%9A%8F%E6%9C%BA%E6%95%B0/)
253268
+ [php_mt_seed - PHP mt_rand() seed cracker](http://www.openwall.com/php_mt_seed/)
@@ -272,6 +287,7 @@
272287
+ [PHP Email Injection Example](http://resources.infosecinstitute.com/email-injection/)
273288

274289
### 其他
290+
+ [Decrypt PHP's eval based encryption with debugger ](https://mp.weixin.qq.com/s?__biz=MzIxNjU3ODMyOQ==&mid=2247483693&idx=1&sn=ed49fc13d8e09f12d87675adff18919f)
275291
+ [Upgrade from LFI to RCE via PHP Sessions](https://www.rcesecurity.com/2017/08/from-lfi-to-rce-via-php-sessions/)
276292
+ [Xdebug: A Tiny Attack Surface](https://ricterz.me/posts/Xdebug%3A%20A%20Tiny%20Attack%20Surface)
277293
+ [Exploitable PHP functions](https://stackoverflow.com/questions/3115559/exploitable-php-functions)
@@ -324,6 +340,7 @@
324340

325341

326342
## python-Web
343+
+ [python web 安全总结](http://bobao.360.cn/learning/detail/4522.html)
327344
+ [Defencely Clarifies Python Object Injection Exploitation](http://defencely.com/blog/defencely-clarifies-python-object-injection-exploitation/)
328345
+ [Exploiting Python Deserialization Vulnerabilities](https://crowdshield.com/blog.php?name=exploiting-python-deserialization-vulnerabilities)
329346
+ [Explaining and exploiting deserialization vulnerability with Python(EN)](https://dan.lousqui.fr/explaining-and-exploiting-deserialization-vulnerability-with-python-en.html)
@@ -461,6 +478,7 @@
461478

462479
# CTF
463480
## 技巧总结
481+
+ [CTF线下防御战 — 让你的靶机变成“铜墙铁壁”](http://bobao.360.cn/ctf/detail/210.html)
464482
+ [ctf-wiki](https://ctf-wiki.github.io/ctf-wiki/#/introduction)
465483
+ [CTF中那些脑洞大开的编码和加密](https://www.hackfun.org/CTF/coding-and-encryption-of-those-brain-holes-in-CTF.html)
466484
+ [CTF加密与解密 ](http://thief.one/2017/06/13/1/)

0 commit comments

Comments
 (0)