首页
学习
活动
专区
圈层
工具
发布
    • 综合排序
    • 最热优先
    • 最新优先
    时间不限
  • 来自专栏网络攻防实战知识交流

    High-Level Approaches for Finding Vulnerabilities

    Fri 15 September 2017 This post is about the approaches I've learned for finding vulnerabilities in Generic vulnerabilities (e.g. Many web application vulnerabilities are found this way. A subset of them can have vulnerabilities, and a subset of those vulnerabilities can "bubble-up" to Vulnerability Complexity Vulnerabilities vary in a spectrum of complexity.

    63860发布于 2021-11-02
  • 来自专栏FreeBuf

    解读Dragonblood Vulnerabilities

    今天早上一觉醒来,按照往常的习惯刷了一下 ZDNet,惊奇的发现了一篇名为《Dragonblood vulnerabilities disclosed in WiFi WPA3 standard》,我的妈呀 我英语水平还不是很渣,那就研究研究喽,《Dragonblood vulnerabilities disclosed in WiFi WPA3 standard》是由一位叫 卡塔琳·西帕努的安全记者报道的

    1K40发布于 2019-05-09
  • 来自专栏Node Python Go全栈开发

    Web Security 之 DOM-based vulnerabilities

    DOM-based vulnerabilities 在本节中,我们将描述什么是 DOM ,解释对 DOM 数据的不安全处理是如何引入漏洞的,并建议如何在您的网站上防止基于 DOM 的漏洞。

    2.1K10发布于 2021-03-19
  • 来自专栏Deen的代金券日记

    SQL Injection vulnerabilities in the latest vtiger crm (v7.2)

    can get the source code from https://www.vtiger.com/open-source-crm/download-open-source/ 0x02 Sqli vulnerabilities ; we can control the $request->get('excluded_ids')) variable to sql injecttion. 0x03 Trigger vulnerabilities

    1.6K40发布于 2020-04-10
  • 来自专栏绿盟科技研究通讯

    论文解读Can LLM Identify And Reason About Security Vulnerabilities?

    来自波士顿大学、新南威尔士大学、IBM实验室的六位作者于12月19日发表了一篇名为《Can Large Language Models Identify And Reason About Security Vulnerabilities Can Large Language Models Identify And Reason About Security Vulnerabilities?

    89510编辑于 2024-01-28
  • 来自专栏达达前端

    We found potential security vulnerabilities in your dependencies. Only the owner of this reposito...

    找到一个叫做.gitignore,把package-lock.json贴在这个文件里

    58720发布于 2019-07-19
  • 来自专栏Ms08067安全实验室

    【学员分享】基于sqlmap对DVWA靶场SQL注入进行破解

    本文作者:啊昊(WEB安全攻防星球学员) LOW等级 尝试正确的提交方式: 查看地址: http://www.d.com/DVWA-1.9/vulnerabilities/sqli/? 开启sqlmap对改网址进行扫描: C:\Python27\sqlmap>sqlmap.py -u "http://www.d.com/DVWA-1.9/vulnerabilities/sqli/? 查看数据库: C:\Python27\sqlmap>sqlmap.py -u "http://www.d.com/DVWA-1.9/vulnerabilities/sqli/? 查看数据包: POST /DVWA-1.9/vulnerabilities/sqli/ HTTP/1.1 Host: www.d.com User-Agent: Mozilla/5.0 (Windows 因此在sqlmap用如下指令进行测试: sqlmap.py -u "http://www.d.com/DVWA-1.9/vulnerabilities/sqli/" --cookie "security

    3.8K20发布于 2020-05-26
  • 来自专栏网络安全技术点滴分享

    ExPRT.AI如何预测下一个将被利用的漏洞

    With ExPRT.AI, security can act faster to fix the vulnerabilities most critical to their environment.How In fact, attackers sometimes favor lower-severity vulnerabilities, in particular when chaining vulnerabilities While pre-authentication vulnerabilities receive out-of-band patches and are typically prioritized for evaluates vulnerabilities in the context of real attacker tradecraft. Falcon Exposure Management surfaces vulnerabilities that intersect exploitability and business impact

    17210编辑于 2025-10-23
  • 来自专栏安全预演

    编写Java自动化代码审计工具

    对于每个方法,我们使用正则表达式来检测是否存在漏洞,并将漏洞报告添加到 vulnerabilities 列表中。最后,我们将 vulnerabilities 列表返回。 3. = scanner.scan(sourceCode); assertEquals(vulnerabilities.size(), 1); assertEquals(vulnerabilities.get = scanner.scan(sourceCode); if (vulnerabilities.isEmpty()) { System.out.println ("No vulnerabilities detected."); } else { System.out.println("Vulnerabilities detected :"); for (String vulnerability : vulnerabilities) { System.out.println("-

    1.8K110编辑于 2023-02-16
  • 来自专栏伪架构师

    持续监控集群中的镜像漏洞

    使用 Trivy 获取到 JSON 格式出具的扫描结果之后,就可以利用 Shell Operator 的指标输出能力,把数据整理为如下格式: {"name":"so_vulnerabilities"," set":0,"labels":{"image":"dustise/sleep:v0.9.6","severity":"UNKNOWN"}} {"name":"so_vulnerabilities"," {hook="trivy-scanner.py",image="dustise/sleep:v0.9.6",severity="CRITICAL"} 1 so_vulnerabilities{hook= ",image="dustise/sleep:v0.9.6",severity="LOW"} 2 so_vulnerabilities{hook="trivy-scanner.py",image="dustise /sleep:v0.9.6",severity="MEDIUM"} 9 so_vulnerabilities{hook="trivy-scanner.py",image="dustise/sleep:v0.9.6

    66820发布于 2021-04-08
  • 来自专栏用户4822892的专栏

    How to Improve Security in Web Application Development?

    You'll have to visit their site for a full overview, in any case, the most generally observed vulnerabilities It moreover empowers reliable testing and a change of vulnerabilities. This will ensure that you spread both code-based and astute vulnerabilities in a skilful and mindful Keep in mind, WAFs work by arrangement dealing with known vulnerabilities. These prizes are given for the disclosure and private declaring of normally discovered vulnerabilities

    53530发布于 2019-11-20
  • 来自专栏TeamsSix的网络空间安全专栏

    工具使用 | sqlmap的简单使用--以DVWA为靶场

    0x00 找到注入点 http://192.168.1.110/dvwa/vulnerabilities/sqli/?id=1&Submit=%E6%8F%90%E4%BA%A4# ? 0x01 利用sqlmap进行注入 Sqlmap -u "http://192.168.1.110/dvwa/vulnerabilities/sqli/? 利用—dbs参数获取数据库信息 Sqlmap -u "http://192.168.1.110/dvwa/vulnerabilities/sqli/? 利用-T指定表,—colums查看该表下所有列 Sqlmap -u "http://192.168.1.110/dvwa/vulnerabilities/sqli/? 最后利用-C指定列,—dump进行脱裤 Sqlmap -u "http://192.168.1.110/dvwa/vulnerabilities/sqli/?

    2.1K20发布于 2019-09-24
  • 来自专栏云原生实验室

    持续监控集群中的镜像漏洞

    使用 Trivy 获取到 JSON 格式出具的扫描结果之后,就可以利用 Shell Operator 的指标输出能力,把数据整理为如下格式: {"name":"so_vulnerabilities"," set":0,"labels":{"image":"dustise/sleep:v0.9.6","severity":"UNKNOWN"}} {"name":"so_vulnerabilities"," {hook="trivy-scanner.py",image="dustise/sleep:v0.9.6",severity="CRITICAL"} 1 so_vulnerabilities{hook= ",image="dustise/sleep:v0.9.6",severity="LOW"} 2 so_vulnerabilities{hook="trivy-scanner.py",image="dustise /sleep:v0.9.6",severity="MEDIUM"} 9 so_vulnerabilities{hook="trivy-scanner.py",image="dustise/sleep:v0.9.6

    62520发布于 2021-04-23
  • 来自专栏文鹃阁

    DVWA靶机练习之File Inclusion

    文件看看 反正只要知道服务器上文件的位置,就可以进行读取了,一般如果知道了某个 webshell 的位置,用文件包含漏洞可以直接连上网站后台 本地文件包含: http://localhost/dvwa/vulnerabilities /php.ini 远程文件包含: http://localhost/dvwa/vulnerabilities/fi/? 级别的方法就不行了,直接会报错,看看源代码发现是将路径和 http 协议进行了字符串替换,其实这个还挺简单的,那就直接双写就可以绕过了 本地文件包含: http://localhost/dvwa/vulnerabilities /php.ini 远程文件包含: http://localhost/dvwa/vulnerabilities/fi/? page=hthttp://tp://localhost/dvwa/php.ini 或者直接用绝对路径(low 级别已经知道了服务器绝对路径): http://localhost/dvwa/vulnerabilities

    62010编辑于 2022-09-01
  • 来自专栏TestOps云层

    安全测试工具sqlmap

    一个简单的get注入: python sqlmap.py -u "http://127.0.0.1/dvwa/vulnerabilities/sqli/? 查看dvwa对应的cookie值为: 利用cookie值进行登录验证后注入: python sqlmap.py -u "http://127.0.0.1/dvwa/vulnerabilities/sqli PHPSESSID=4iij3d2sluivmqejvpvi88tpd7" --dbs #查看当前的数据库名称 python sqlmap.py -u "http://127.0.0.1/dvwa/vulnerabilities PHPSESSID=4iij3d2sluivmqejvpvi88tpd7" --current-db #查看当前库所有表格 python sqlmap.py -u "http://127.0.0.1/dvwa/vulnerabilities 4iij3d2sluivmqejvpvi88tpd7" --batch -D dvwa --tables #查看表数据格式 python sqlmap.py -u "http://127.0.0.1/dvwa/vulnerabilities

    82020编辑于 2022-04-07
  • 来自专栏网络攻防实战知识交流

    DVWA笔记(六)----File Inclusion

    此时的url为 http://127.0.0.1/DVWA-master/vulnerabilities/fi/? 漏洞利用 1、本地文件包含 构造url http://127.0.0.1/DVWA-master/vulnerabilities/fi/?page=/etc/hack ? 1) http://127.0.0.1/DVWA-master/vulnerabilities/fi/?page=..\..\..\..\..\..\..\..\.. 构造url http://127.0.0.1/DVWA-master/vulnerabilities/fi/? http://127.0.0.1/DVWA-master/vulnerabilities/fi/?

    1.4K20发布于 2019-07-25
  • 来自专栏FreeBuf

    burpgpt:一款集成了OpenAI GPT的Burp Suite安全漏洞扫描扩展

    工具使用样例 识别Web应用程序(使用了包含安全漏洞的加密库)中的潜在安全漏洞: Analyse the request and response data for potential security vulnerabilities {REQUEST_BODY} Biometric Authentication Response Body: {RESPONSE_BODY} Identify any potential vulnerabilities Analyse the request and response data exchanged between serverless functions for potential security vulnerabilities Body: {REQUEST_BODY} Serverless Function B Response Body: {RESPONSE_BODY} Identify any potential vulnerabilities 通过分析请求和响应数据,扫描针对单页应用程序(SPA)框架潜在的安全漏洞: Analyse the request and response data for potential security vulnerabilities

    1.3K20编辑于 2023-09-08
  • 来自专栏网络安全技术点滴分享

    WPScan WordPress 安全扫描器分析

    Model class WpVersion < CMSScanner::Model::Version include Vulnerable def vulnerabilities return @vulnerabilities if @vulnerabilities @vulnerabilities = [] Array (db_data['vulnerabilities']).each do |json_vuln| @vulnerabilities << Vulnerability.load_from_json (json_vuln) end @vulnerabilities end end end end ### 关键技术

    35000编辑于 2025-06-16
  • 来自专栏测试技术圈

    安全测试工具sqlmap

    一个简单的get注入: python sqlmap.py -u "http://127.0.0.1/dvwa/vulnerabilities/sqli/? 利用cookie值进行登录验证后注入: python sqlmap.py -u "http://127.0.0.1/dvwa/vulnerabilities/sqli/? 可以查看到注入点为id,之后利用漏洞,获取数据库数据: #查看所有的数据库 python sqlmap.py -u "http://127.0.0.1/dvwa/vulnerabilities/sqli PHPSESSID=4iij3d2sluivmqejvpvi88tpd7" --dbs #查看当前的数据库名称 python sqlmap.py -u "http://127.0.0.1/dvwa/vulnerabilities PHPSESSID=4iij3d2sluivmqejvpvi88tpd7" --current-db #查看当前库所有表格 python sqlmap.py -u "http://127.0.0.1/dvwa/vulnerabilities

    1.9K20发布于 2019-12-05
  • 来自专栏FreeBuf

    使用Anchore Enine来完善DevSecOps工具链

    Feed sync: Checking sync completion for feed set (vulnerabilities)... Feed sync: Checking sync completion for feed set (vulnerabilities)... Feed sync: Checking sync completion for feed set (vulnerabilities)... Feed sync: Checking sync completion for feed set (vulnerabilities)... 681 vulnerabilities alpine:3.5 2020-06-22T03:09:16.594355 875 vulnerabilities

    2.6K20发布于 2020-07-22
领券