Day017

今日文章进度:

1.《晚熟的人》读书笔记 明天发布

2. 最新Bin2Code框架CodeCMR解读 已完成

3. 论文解读

https://www.xiaojingliao.com/uploads/9/7/0/2/97024238/ccs_2020_advance.pdf 未完成

漏洞挖掘资料学习

1.怎么处理漏洞报告

https://medium.com/@eldeebxboy/error-4o4-triage-team-not-found-5a88d3eb3f3e

2.使用图片入侵

https://medium.com/@chiragsukhala/hacking-web-using-images-chira-attack-vector-63e15a1f7dac

3.得到本地的Instagram照片

https://medium.com/@abraham.yeransian/mitm-gaining-access-to-instagram-photos-66e12844d4be

4.新的漏洞挖掘学习网站

https://www.bugbountyhunter.com/

5.制造你的假身份

https://ixinian.com/2020/11/04/%E8%A3%BD%E4%BD%9C%E4%BD%A0%E7%9A%84%E5%81%87%E8%BA%AB%E4%BB%BD-%E5%8C%BF%E5%90%8D%E9%81%8A%E6%88%B2/

6.渗透测试资料

https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE

7.研究人员如何从一张照片中找到您的位置

https://medium.com/osint/how-an-investigator-can-find-your-location-from-one-photograph-8ece82c4380f

8.在JS代码中寻找敏感信息

https://duckoverflow.medium.com/public-and-secret-api-key-leaked-in-javascript-source-fbe45b6bc617

漏洞报告学习

1.SMTP interaction theft via MITM

https://hackerone.com/reports/953219

2.Access to multiple production Grafana dashboards

https://hackerone.com/reports/663628

3.GitLab-Runner on Windows `DOCKER_AUTH_CONFIG` container host Command Injection

https://hackerone.com/reports/955016

4.From a 500 error to Django admin takeover

https://blog.shashank.co/2020/11/from-500-error-to-django-admin-takeover.html

发表评论

Fill in your details below or click an icon to log in:

WordPress.com 徽标

您正在使用您的 WordPress.com 账号评论。 注销 /  更改 )

Facebook photo

您正在使用您的 Facebook 账号评论。 注销 /  更改 )

Connecting to %s