2019-11-3 read some of the articles notes

1 RMI- deserialization 

https://xz.aliyun.com/t/6660

Mainly to talk about the complete process under RMI, involving the server and client demo code, and also caught with wireshark flow under this process

 

2 from a question to HTTP request smuggling protocol layer attack

https://xz.aliyun.com/t/6654#toc-12

Before seen in the tutorial burp official website now basically forgot. . )

This stuff would be used primarily around waf.

Reading this article or to learn some of the details

HTTP 1.1's pipeline: the client can not wait for the server response to a request has been issued

HTTP request smuggling is the use of a reverse proxy server and back-end servers appear at the same time or different ways of dealing with multiple occurrences in the Content-Length and Transfer-Encoding.

 

3 XSS to bypass a shield

https://xz.aliyun.com/t/6652

XSS bypass, test tags and unusual events

3.1 Common tags can not pay more attention to the latest HTML5 tags

3.2 uncommon event, by fuzz

3.3 payload, the payload into pieces gradually to fuzz

A few examples

<video onkeyup=setTimeout`al\x65rt\x28/2/\x29```>

<button onfucus=prompt(1) autofocus>
<select autofocus onfocus=prompt(1)>
 

 

Guess you like

Origin www.cnblogs.com/junmoxiao/p/11789934.html