author:bilala
PHP安全特性
parse_url()函数小记:
https://skysec.top/2017/12/15/parse-url%E5%87%BD%E6%95%B0%E5%B0%8F%E8%AE%B0/
php临时文件机制:https://www.anquanke.com/post/id/183046?from=groupmessage
哈希比较缺陷:https://blog.csdn.net/mochu7777777/article/details/114494427
SQL
非常全的SQL总结:https://mp.weixin.qq.com/s/vdUoQU2WS7zf0EKHFYKNvg
也是一篇很全的总结:https://www.anquanke.com/post/id/254168
超详细的盲注总结:https://www.gem-love.com/2022/01/26/%E4%B8%80%E6%96%87%E6%90%9E%E5%AE%9AMySQL%E7%9B%B2%E6%B3%A8/
两种CTF中特殊盲注的利用:https://www.secpulse.com/archives/153095.html
MySQL中的waf绕过技巧:https://www.cnblogs.com/R0ser1/p/14832719.html
二次注入:https://www.jianshu.com/p/3fe7904683ac
floor()报错注入:https://blog.csdn.net/zpy1998zpy/article/details/80650540
MySQL的SQL预处理:https://www.cnblogs.com/geaozhang/p/9891338.html
Quine考点:https://www.anquanke.com/post/id/253570
文件包含
PHP伪协议总结:https://segmentfault.com/a/1190000018991087
PHP Filter伪协议trick:https://blog.csdn.net/gental_z/article/details/122303393
PHP Filter深入利用:https://www.anquanke.com/post/id/202510
RCE
PHP bypass disable_function:
https://segmentfault.com/a/1190000038646341
利用GCONV_PATH与iconv进行bypass dis func:https://blog.csdn.net/qq_42303523/article/details/117911859
无参数RCE:https://skysec.top/2019/03/29/PHP-Parametric-Function-RCE/
无字母数字webshell:
http://t.zoukankan.com/v01cano-p-11736722.html
https://www.leavesongs.com/PENETRATION/webshell-without-alphanum.html
https://www.leavesongs.com/PENETRATION/webshell-without-alphanum-advanced.html
https://blog.csdn.net/miuzzx/article/details/109143413
Linux反弹shell:https://xz.aliyun.com/t/2549
SSRF
内容比较丰富的一篇:https://www.freebuf.com/articles/web/260806.html
SSRF在有无回显方面的利用:https://xz.aliyun.com/t/6373
内容也挺多的一篇:https://blog.csdn.net/u010726042/article/details/77806775
反序列化
非常全的一篇总结:https://y4tacker.blog.csdn.net/article/details/113588692
PHP原生类的利用:
https://www.anquanke.com/post/id/238482
https://mp.weixin.qq.com/s/PrIwbUtc8KoqWcVsWte_Rg
https://mp.weixin.qq.com/s/uNcPHMMq0vRvf-ZQ6oZ8_g
SoapClient类反序列化SSRF:https://zhuanlan.zhihu.com/p/80918004
phar,有讲解和本地复现:
https://www.freebuf.com/articles/web/205943.html
phar://的底层源码分析:https://guokeya.github.io/post/uxwHLckwx/
session反序列化,有原理和本地复现和例题:
https://www.cnblogs.com/litlife/p/10748506.html
https://mp.weixin.qq.com/s/VoUSSb7ISbOJS4ixgjmZMg
SSTI
比较全的一篇:https://www.cnblogs.com/20175211lyz/p/11425368.html
jinja2的SSTI:https://blog.csdn.net/u011377996/article/details/86776181
flask:https://xz.aliyun.com/t/3679
CVE
log4j2:https://www.cnblogs.com/gaojia-hackerone/p/15689369.html
log4j waf绕过:https://www.cnblogs.com/ph4nt0mer/p/15701647.html
Trick
PHP中PCRE回溯次数限制的利用:https://www.leavesongs.com/PENETRATION/use-pcre-backtrack-limit-to-bypass-restrict.html
CTF中php的比较全的trick:https://www.anquanke.com/post/id/244494
不知道怎么归类😁
讲CGI,PHP-CGI等一些概念的:
Comments | NOTHING