Jump to content

Title: Pest Test Practical Practice--Spinach Cutting Point

Featured Replies

Posted

Foreword

This article is for communication and learning only. Any direct or indirect consequences and losses caused by the dissemination and utilization of the information provided by this article shall be the responsibility of the user himself, and the author of the article shall not bear any responsibility for this.

Penetration testing can be divided into three stages: information collection. Collect all relevant asset information as much as possible. Determine the scope of the test. Vulnerability discovery. Further vulnerability detection and exploitation of the collected assets. Further exploitation and degree of exploitation of the discovered vulnerabilities. 1. API interface in js 图片

2. Multi-port site 图片3. Customer service system phishing guidance, etc.图片4. Points system targets fragile side stations 图片5. Recharge interface 图片6. Find source code analysis for a demo site leaked source code white box analysis 图片 图片

图片

7. The bc backend is rooted in js resource url, subdomain, etc. and other methods to find general small sites, mostly add the first domain, ad ag admin 123admin ht, etc.图片 Reprinted in the original link: https://mp.weixin.qq.com/s/ZGNKIkfOidLPpjT856LHxw

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

Important Information

HackTeam Cookie PolicyWe have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.