at a time, and one-click backup/Restore.
Yslow
YSlow can be used to analyze Web pages and provide suggestions for improving the Web page and experience.
HTML Validator
This HTML validation tool monitors Web pages based on Firefox's internal validation mechanism and labels the number of errors in the page as icons.
Json View
Usually when you see a. json file, the browser downloads directly instead of opening the file, and Json view lets the browser open
I believe that all of you have had this experience when doing penetration testing, obviously an XSS loophole, but there are XSS filtering rules or WAF protection cause we can not successfully use, such as our input
1. Bypassing MAGIC_QUOTES_GPC
Magic_quotes_gpc=on is a security setting in PHP that will rotate some special characters, such as ' (single quotes) to \, "(double quotes) to \, \ to \
For example: will be converted to , so that our XSS does not take effect.
For Web sites that open MA
I believe everyone has had this experience when conducting penetration tests. It is clear that there is an XSS vulnerability, but there are XSS filtering rules or WAF protection, which makes us unable to use it successfully, for example, if we enter
1. Bypass magic_quotes_gpc
Magic_quotes_gpc = ON is the security setting in php. After it is enabled, some special characters will be rotated, for example, '(single quotation marks) is converted to \', "(double quotation marks) is converted \", \ \\
Bypass the mobile client interface can not directly request the policy first, the client data packet capture, get interface http://mobile.womai.com/wmapi/loginpassword=123456username=wooyun6 direct hackbar access, no data but through the black box test, add the client to identify, you can directly request it. You can use other pants to hit the database, perform brute force verification, and try again, directly check the length of the returned data and
Original article: blog. csdn. netu012764254articledetails51361152 last talked about the basic challenge of less1-10: blog. csdn. netu012764254articledetails51207833, all of which are get-type and contain many types. This time, post-type injection is generally used for login bypass, and of course it is also possible
Http://blog.csdn.net/u012763794/article/details/51361152 the last time I talked about the basic challenge of less1-10: Challenge
Link: http://blog.csdn.net/u012763794/article/detai
This CTF challenge is a bit of a point, let's take a lookThe homepage looks pretty good.Level1The flag can be seen directly F12.Flag:infosec_flagis_welcomeLevel2"This picture looks broken, can you check it?"If I had played Linux, it would have been simple. A Curl command will be able to view the content (as sure as Linux Dafa is good). But I am windows, a little trouble? Download down with UE open to see? Don't do that!Directly right-click is not able to view the source code, then add View-sourc
, understand the vulnerability formation principle and the risk of similar file judgment function, in the experimental environment personally experience a more sense oh, with me to open it! >>>>> file function Experiment Portal1, the goal of hands-on experiment:
Learn about common PHP functions
Understanding PHP file Judgment function risk
Understand the business logic vulnerabilities that file operations can bring
2, the required tools:
Topic Links:http://oj.momomoxiaoxi.com:9090/Scan the URL with DirSearch and find robots.txtCommand line:" http://oj.momomoxiaoxi.com:9090/ " -E *Then enter the URL to open this file:http://oj.momomoxiaoxi.com:9090/robots.txtGet the following page:Found the hidden page, enter the following URL to get the source code:http://oj.momomoxiaoxi.com:9090/index.php?url=file:///var/www/html/ webshe11111111.phpCopy the code to create a new PHP file locally:1PHP2 3 $serverList=Array(4"127.0.0.1"5 );6 $ip=$_
for easy viewing using F12Such a large string of characters, which is Base64 encrypted format we use the tool to decrypt the BASE64 encryption decryptionGive us a bunch of code, flag, in the code.Enter password to view flagTopic Link http://120.24.86.145:8002/baopo/Because the topic link is temporarily not going to go, then updateViewed 1 million timesTopic Link http://120.24.86.145:9001/test/Open the page, ask us to click 1 million times, we look at the source code, see if we can start from th
–batchOr use a statement:Python sqlmap.py-u "http://127.0.0.1/sqli-labs-master/Less-8/?id=1"--current-db--threads--batch--technique BESYou can get information about the database.Question NinethThe topic of deferred injection (as specified above) can also be used with similar statements:Python sqlmap.py-u "http://127.0.0.1/sqli-labs-master/Less-9/?id=1"--technique T--dbs--batch-v 0About 第11-17:Is the issue of post injection, but the internal mixed with the blind problem, the need to use burp Fire
not have permission to read the table that holds the data structure in the system.Violent cracked table in/txt/common-tables.txt, you can add it yourself--common-columns Ibid for column namesCookie InjectionSqlmap-u "cookie.sql.com/test.php"--cookie "id=11"--level 2The parameter in the URL is appended to the cookie parameter, specifying a minimum of 2The HTTP cookie is tested at level 2, and the HTTP User-agent/referer header is tested at Level 3.Post formSqlmap-u "url"--formSqlmap-u "url"--dat
Shaoguan address: http://attack.onebox.so.com/Level 1Q: The second level needs to be accessed from hack.360.cn. Simply clicking a button will not work !~~A: Set the access path to http://hack.360.cn/. you can use the browser plug-in (HackBar) to quickly complete the configuration.URl: http://attack.onebox.so.com/c6c299rf-check.htmlReferrer: http://hack.360.cn/Level 2Q: Where can I find the password !~~A: Answer: i360Pass in an encrypted js http://atta
The mysterious Word backdoor code content:Code function:The above code is a word back door of PHP, when the post data is 0=assert1=phpinfo (), then the Assert (' phpinfo () ') will be executed;The results of sending a POST request under Firefox using the Hackbar plugin are as follows:650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/70/E4/wKioL1XAmYGCkGIIAA_9SAhbIPQ124.jpg "title=" 1.png " alt= "Wkiol1xamygckgiiaa_9sahbipq124.jpg"/>Why do you
The mysterious Word backdoor code content:Code function:The above code is a word back door of PHP, when the post data is 0=assert1=phpinfo (), then the Assert (' phpinfo () ') will be executed;The results of sending a POST request under Firefox using the Hackbar plugin are as follows:650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/70/E4/wKioL1XAmYGCkGIIAA_9SAhbIPQ124.jpg "title=" 1.png " alt= "Wkiol1xamygckgiiaa_9sahbipq124.jpg"/>Why do you
page, the SEO tool plug-in displays various rankings and Seo information on this page.
Adsense pre view 1.5
Https://addons.mozilla.org/en-US/firefox/addon/2132Put Google ads on your web pageNote: Google ads is displayed on the current page to help determine the ad location.
Other tools
Hackbar 1.4.2
Https://addons.mozilla.org/en-US/firefox/addon/3899Includes some common tools. (SQL injection, XSS, encryption, etc)Note: various encoding tool
The mysterious Word backdoor code content:Code function:The above code is a word back door of PHP, when the post data is 0=assert1=phpinfo (), then the Assert (' phpinfo () ') will be executed;The results of sending a POST request under Firefox using the Hackbar plugin are as follows:650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/70/E4/wKioL1XAmYGCkGIIAA_9SAhbIPQ124.jpg "title=" 1.png " alt= "Wkiol1xamygckgiiaa_9sahbipq124.jpg"/>Why do you
($file){6$thisfile=$file;7}89function__destruct () {10EchoShow_source ($thisFileTrue);11}12 13 function __wakeup () {14 $this->file= ' index.php ' ; 15 } 16 } 17 $test = new Sercet ("the_next.php" echo serialize ( $test Span style= "color: #000000"); O:6: "Sercet": 1:{s:12: "Sercet file"; s:12: "the_next.php";} 19, Bypass the regular can use the + number problem is how to bypass __weakup Baidu Once the wakeup method can be bypassed when the number of member attributes is greater
1. Look at the post parameters and construct them in the same way, the result2, enter "Movie=1" in the Hackbar post box, the error contains three single quotes, indicating that it should be a digital injection, the results3, input "movie=1 and 1=1" Normal, input "movie=1 and 1=2" error, the results such as:So there's a digital injection point in the place.4, Judge the number of fields:Enter "movie=1 ORDER by 7" Normal, enter "movie=1 ORDER by 8" error
, XSS, encryption, and so on. Learn to divide URL parameters, construct post parameters, and modify Referer.Advanced Cookie Manager: View, manage, construct cookies, and combine Hackbar to construct most requests. Learn to view, modify, delete, and add to cookies.Proxy Switcher: Agent tool, combined with the following introduction of the capture kit used. 2. Agent Grab BagA. Agent principle: Like an "intermediary", when the client has the data require
XSS3.5 Variant XSS: Persistent control3.6 React XSS04-Business logic and non-conventional vulnerability principle and utilizationPre-Knowledge:familiar with browser Firefox and related development plugin Hackbar, knowledge of XML document.Lesson outline:Chapter One: Business logic vulnerabilities1.1 Permissions Bypass Vulnerability1.2 Payment Logic Vulnerability1.3 Password Recovery Vulnerability1.4 Verification Code SecurityChapter Two: Principle an
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.