unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
What Happens in Your Cloud Doesn’t Stay in Your Cloud: A Not-So-Serious Guide to NIST SP 800–228
文章探讨了API在云和AI时代的重要性及其安全风险,并介绍了NIST SP 800-228标准,强调采用零信任架构以应对内外部威胁。传统安全模型已失效,需通过持续验证和最小权限原则保护API安全。...
2025-9-11 05:52:44 | 阅读: 10 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
perimeter
forgotten
loudly
expensively
How a Client-Side CSRF Flaw Breaks a Core Defense
文章探讨了跨站请求伪造(CSRF)攻击及其常见防御机制——同步器令牌模式的潜在漏洞。尽管该模式被视为标准防护措施,但若基础配置或实现存在缺陷,则可能使防御失效。作者通过实际案例强调了正确实施安全控制的重要性。...
2025-9-11 05:48:55 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
attacker
security
embeds
friendlink
Advanced Free Resources for Bug Bounty Hunters
文章介绍了多种免费工具和资源,帮助赏金猎人高效发现和利用漏洞。这些工具包括AI驱动的自动化框架CAI,性能远超人类,在某些任务上快3600倍,并能降低测试成本达156倍。通过结合AI与人工审核,确保结果准确可靠。...
2025-9-11 05:40:15 | 阅读: 8 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
comparable
accuracy
Advanced Free Resources for Bug Bounty Hunters
文章介绍了一系列免费工具和资源,助力网络安全研究人员发现和利用漏洞。其中,AI驱动的自动化工具如CAI框架显著提升了效率和准确性,适合不同水平的安全从业者使用。...
2025-9-11 05:40:15 | 阅读: 1 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
highlights
oversight
comparable
OSCP Tactics: Tunneling and Port Forwarding
文章介绍了隧道技术在网络安全中的应用,解释了其如何帮助攻击者在目标机器上使用工具并访问内部网络。通过实例说明了隧道技术的实用性和重要性。...
2025-9-11 05:39:41 | 阅读: 6 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
tunneling
foothold
shed
machine
download
I Am Now a Certified Red Team Analyst (CRTA) — My Journey with CyberWarFare Labs
文章讲述了作者通过 Certified Red Team Analyst (CRTA) 认证的经历,分享了备考过程、考试内容及实用技巧。CRTA 是一项注重实战的红队认证,考试包含 6 小时的 AD 环境渗透测试。作者强调了枚举、工具使用及冷静分析的重要性,并推荐了相关练习平台和资源。...
2025-9-11 05:38:37 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
crta
pivoting
bloodhound
teaming
bigger
Why “Failing” a Pen Test is Actually Your Best Outcome
渗透测试中发现更多漏洞反而是好事。虚假的安全感可能隐藏真实风险。每个漏洞都是学习机会。发现越多越能改进安全措施。...
2025-9-11 05:30:24 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
feels
sounds
packed
thorough
DeepProbe: Open-Source Memory Forensics with ATT&CK-Mapped Detections
DeepProbe 是一个开源工具框架,用于自动化内存取证分析。它结合 Volatility 框架和专家检测逻辑,通过预定义基线和关联异常信号生成可操作的结果。该工具支持多种操作系统内存分析,并提供与 MITRE ATT&CK 战术映射的检测类别,帮助分析师快速识别攻击行为并减少误报。...
2025-9-10 07:47:35 | 阅读: 5 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
artifacts
memory
deepprobe
anomalies
injection
This Silent Attack Can Hijack Any Website You Trust-Here’s How It Works
DNS欺骗通过伪造域名解析将用户引导至仿冒网站,窃取敏感信息。该攻击隐蔽性强,用户难以察觉。...
2025-9-10 07:47:8 | 阅读: 5 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
knows
translates
pops
freepikyou
gave
Beyond CVE: Crafting a Comprehensive Vulnerability Intelligence Strategy for Modern Security Teams
漏洞情报需超越CVE监控,整合多源数据(如NVD、商业数据库、开源和供应商渠道),结合自动化与人工分析,构建全面、动态的安全策略以应对快速变化的威胁环境。...
2025-9-10 06:5:6 | 阅读: 18 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
security
database
nvd
scoring
How I Found an Exposed User Database via an Unprotected API (And How to Prevent It) in a private…
作者通过使用ffuf工具扫描发现了一个未受保护的Django REST API端点,暴露了包含150多个用户记录的敏感数据,包括密码、邮箱和角色等信息。...
2025-9-10 06:4:26 | 阅读: 17 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
wasting
unprotected
superuser
goldmine
How I Found an Exposed User Database via an Unprotected API (And How to Prevent It) in a private…
一位安全研究人员通过ffuf工具发现了一个未受保护的Django REST API端点api.example.com/user/,该端点暴露了超过150个用户记录,包括哈希密码、电子邮件和角色信息。此漏洞可能被攻击者利用。...
2025-9-10 06:4:26 | 阅读: 14 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
alaikum
intresting
unprotected
assalam
storyfree
How i found first account takeover, reported and got the bounty in same day and in same hour.
作者通过修改host header和referer header,在目标网站的重置密码功能中发现了账户接管漏洞,并迅速报告后获得漏洞奖励。...
2025-9-10 06:4:16 | 阅读: 12 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
forgot
communityso
applicable
apologise
seepress
How i found first account takeover, reported and got the bounty in same day and in same hour.
作者通过修改重置密码功能中的host header,成功触发了账户接管漏洞,并在短时间内报告并获得了赏金。...
2025-9-10 06:4:16 | 阅读: 14 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
forgot
seepress
rakh
applicable
myemail
A very easy bug anyone can find and ignored by many bug bounty hunters
作者描述了一次测试超链接注入漏洞的经历,在目标网站的订阅表单中尝试注入HTML和SSTIayload部分被过滤但成功注入超链接并收到邮件确认对漏洞是否被认可持保留态度。...
2025-9-10 06:3:39 | 阅读: 15 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
payload
sizei
inbox
readers
A very easy bug anyone can find and ignored by many bug bounty hunters
作者测试私有程序时发现一博客订阅表单,尝试注入HTML和SSTIayload,部分字符被移除。再次尝试简单超链接成功注入。...
2025-9-10 06:3:39 | 阅读: 13 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
payload
sizethen
inbox
sizei
acceptance
IDOR: How I Could Delete Any Product Image on an E-Commerce Platform
Mahmoud El Manzalawy发现了一个不安全直接对象引用(IDOR)漏洞,在图像删除端点中。该漏洞允许攻击者通过修改img_id参数删除其他用户的图像,服务器未验证请求来源。此漏洞可能导致大规模图像删除和业务中断。...
2025-9-10 06:2:41 | 阅读: 16 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
deletion
attacker
deleteimage
jqxhr
931887
IDOR: How I Could Delete Any Product Image on an E-Commerce Platform
作者发现某平台存在不安全直接对象引用(IDOR)漏洞,在图像删除端点处未验证用户身份。攻击者通过修改`img_id`参数可删除任意用户的图像,导致业务受损和用户信任下降。...
2025-9-10 06:2:41 | 阅读: 11 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
deletion
deleteimage
attacker
jqxhr
931887
(My)Reasons Why I failed OSCP: Do Not Make Same Mistakes
作者分享了自己备考OSCP的经历和教训,强调从失败中学习的重要性,并警告不要只依赖PEN200等单一资源。...
2025-9-10 05:51:57 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
htb
oscp
offsec
ended
pen200
How I Turned a $4 Microcontroller into a Rubber Ducky
文章介绍了一种利用Raspberry Pi Pico制作低成本USB键盘仿冒工具的方法,展示了其如何通过模拟键盘输入执行恶意操作,并探讨了相关伦理问题及防御措施。...
2025-9-10 05:51:27 | 阅读: 5 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
pico
hid
attacker
attackers
library
Previous
-17
-16
-15
-14
-13
-12
-11
-10
Next