Notice
Recent Posts
Recent Comments
Link
| 일 | 월 | 화 | 수 | 목 | 금 | 토 |
|---|---|---|---|---|---|---|
| 1 | 2 | |||||
| 3 | 4 | 5 | 6 | 7 | 8 | 9 |
| 10 | 11 | 12 | 13 | 14 | 15 | 16 |
| 17 | 18 | 19 | 20 | 21 | 22 | 23 |
| 24 | 25 | 26 | 27 | 28 | 29 | 30 |
| 31 |
Tags
- gdb memory dump
- http request smuggling
- Frida
- 보안진단원
- actuator endpoint
- hooking script
- without frida
- actuator env
- graphiql
- gdb debug
- source map
- so hooking
- 휴대폰 번호 변조
- firebasescanner
- actuator heapdump
- Firebase Real-time Database
- trace cipher
- Android
- APP 진단
- android hooking
- 취약점
- spring boot 취약점
- digest hooking
- Android 취약점진단
- 무결성 검증 우회
- Firebase 취약점
- trace intent
- gdb 메모리 덤프
- native code hooking
- 취약점진단
Archives
- Today
- Total
목록actuator heapdump (1)
Und3r__Score__
해당 게시글은 아래의 페이지를 번역하여 정리 및 참고하였습니다. Expoting Spring Boot Actuators Exploiting Spring Boot Actuators | Veracode This post was updated May 1, 2019 The Spring Boot Framework includes a number of features called actuators to help you monitor and manage your web application when you push it to production. Intended to be used for auditing, health, and metrics gathering, www.veracode.com Sprint Boot Ac..
취약점진단/WEB
2024. 2. 20. 14:07