Практическая работа 3 1. SQL-injection уязвимости: https://portswigger.net/web-security/sql-injection/lab-login-bypass  https://portswigger.net/web-security/sql-injection/lab-retrieve-hidden-data  https://portswigger.net/web-security/sql-injection/union-attacks/lab-retrieve-datafrom-other-tables  https://portswigger.net/web-security/sql-injection/examining-the-database/labquerying-database-version-mysql-microsoft  2. XSS уязвимости: https://portswigger.net/web-security/cross-site-scripting/stored/lab-html-contextnothing-encoded  https://portswigger.net/web-security/cross-site-scripting/dom-based/lab-documentwrite-sink  https://portswigger.net/web-security/cross-site-scripting/contexts/lab-javascriptstring-angle-brackets-html-encoded  https://portswigger.net/web-security/cross-site-scripting/dom-based/lab-dom-xssreflected  3. CSRF: https://portswigger.net/web-security/csrf/lab-no-defenses  https://portswigger.net/web-security/csrf/lab-token-validation-depends-on-requestmethod  4. SSRF: https://portswigger.net/web-security/ssrf/lab-basic-ssrf-against-localhost  https://portswigger.net/web-security/ssrf/lab-ssrf-filter-bypass-via-open-redirection  5. RCE: https://portswigger.net/web-security/os-command-injection/lab-simple  6. Path traversal: https://portswigger.net/web-security/file-path-traversal/lab-simple  https://portswigger.net/web-security/file-path-traversal/lab-absolute-path-bypass 
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up