随笔分类 - 安全主题
摘要:In one day I decided to stop hunting Bugs in Facebook Mobile android , IOS and Windows phone apps and start hunting bugs in facebook.com website. I sa
阅读全文
摘要:
aaa
阅读全文
摘要:Hello all so this post is about how I was able to hijack ton’s of domains/subdomains who using Instapage if there service got expired. What is instapa
阅读全文
摘要:Hackers can claim subdomains with the help of external services. This attack is practically non-traceable, and affects at least 17 large service provi
阅读全文
摘要:TLDR C'mon, show me the XSS domain takeover 5 mins later… So how did you take over the domain? So is this bad?
阅读全文
摘要:I was bug hunting on a site which looked like this: POST /snip/snippet.php HTTP/1.1 <?xml version="1.0"?> I tested in BURP for XSS in XML, and it work
阅读全文
摘要:Unfortunately,MicrosoftSQLServer'sSQLdialectTransact-SQLdoesnotsupportreadingandwritingfilesinaneasywayasopposedtoMySQL'sLOAD_FILE() functionandINTOOU...
阅读全文
摘要:0x00 相关背景介绍Clickjacking(点击劫持)是由互联网安全专家罗伯特·汉森和耶利米·格劳斯曼在2008年首创的。是一种视觉欺骗手段,在web端就是iframe嵌套一个透明不可见的页面,让用户在不知情的情况下,点击攻击者想要欺骗用户点击的位置。由于点击劫持的出现,便出现了反frame嵌套...
阅读全文
摘要:######################################################################ExploitTitle:FalseSQLinjectionandadvancedblindSQLinjection##Date:21/12/2011##Aut...
阅读全文
摘要:####http://h.ackack.net/faster-blind-mysql-injection-using-bit-shifting.htmlforaHTMLversion#MadebyJelmerdeHen#H.ackAck.net#####Whilestrollingthroughmy...
阅读全文
摘要:1直接上语法2select*fromuserswhereid=8E0unionselect1,2,3,4,5,6,7,8,9,03select*fromuserswhereid=8.0unionselect1,2,3,4,5,6,7,8,9,04select*fromuserswhereid=\N...
阅读全文

浙公网安备 33010602011771号