일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
22 | 23 | 24 | 25 | 26 | 27 | 28 |
29 | 30 |
- Firebase Real-time Database
- 취약점
- 무결성 검증 우회
- actuator env
- Android
- http request smuggling
- native code hooking
- hooking script
- digest hooking
- Android 취약점진단
- so hooking
- spring boot 취약점
- Frida
- without frida
- 보안진단원
- actuator endpoint
- source map
- Firebase 취약점
- gdb 메모리 덤프
- gdb memory dump
- APP 진단
- firebasescanner
- actuator heapdump
- trace cipher
- android hooking
- 취약점진단
- trace intent
- graphiql
- gdb debug
- 휴대폰 번호 변조
- Today
- Total
목록취약점진단/WEB (5)
Und3r__Score__

해당 게시글은 아래의 페이지를 번역하여 정리 및 참고하였습니다. Source Map 101: What Developers Should Know About This Security Risk Source Map 101: What Developers Should Know About This Security Risk What could be a developer's worse nightmare than having their app's source code exposed? If you are a front-end developer, you should be… javascript.plainenglish.io Source map source map은 파일의 원본 소스코드(예: JavaScript 파일)를 컴파일되고..

해당 게시글은 아래의 페이지를 번역하여 정리 및 참고하였습니다. GraphQL API vulnerabilities GraphQL API vulnerabilities | Web Security Academy GraphQL vulnerabilities generally arise due to implementation and design flaws. For example, the introspection feature may be left active, enabling ... portswigger.net GraphQL Vulnerabilities and Common Attacks: What You Need to Know GraphQL API Vulnerabilities and Common Attacks | ..

해당 게시글은 아래의 페이지를 번역하여 정리 및 참고하였습니다. Expoting Spring Boot Actuators Exploiting Spring Boot Actuators | Veracode This post was updated May 1, 2019 The Spring Boot Framework includes a number of features called actuators to help you monitor and manage your web application when you push it to production. Intended to be used for auditing, health, and metrics gathering, www.veracode.com Sprint Boot Ac..

해당 게시글은 아래 3개의 페이지를 번역하여 정리하였습니다. Advanced request smuggling Advanced request smuggling | Web Security Academy In this section, we'll build on the concepts you've learned so far and teach you some more advanced HTTP request smuggling techniques. We'll also cover a ... portswigger.net HTTP/2: The Sequel is Always Worse HTTP/2: The Sequel is Always Worse In this research paper James Kettle introdu..

해당 게시글은 아래 2개의 페이지를 번역하여 정리 및 참고하였습니다. insecure deserialization Insecure deserialization | Web Security Academy In this section, we'll cover what insecure deserialization is and describe how it can potentially expose websites to high-severity attacks. We'll highlight ... portswigger.net Exploiting insecure deserialization vulnerabilities Exploiting insecure deserialization vulnerabilities | Web ..