Web Security Learning
stable

Content Index:

  • 1. Prologue
  • 2. Computer Networks and Protocols
  • 3. Information Collection
  • 4. Common vulnerability attack and defense
  • 5. Language and Framework
    • 5.1. PHP
    • 5.2. Python
    • 5.3. Java
    • 5.4. JavaScript
    • 5.5. Golang
    • 5.6. Ruby
    • 5.7. ASP
    • 5.8. PowerShell
    • 5.9. Shell
    • 5.10. CSharp
  • 6. Intranet penetration
  • 7. Cloud Security
  • 8. Defense Technology
  • 9. Authentication Mechanism
  • 10. Tools and Resources
  • 11. Manual Quick Check
  • 12. Others
Web Security Learning
  • »
  • 5. Language and Framework

5. Language and FrameworkΒΆ

Content Index:

  • 5.1. PHP
    • 5.1.1. Backdoor
    • 5.1.2. Deserialization
    • 5.1.3. Disable Functions
    • 5.1.4. Open Basedir
    • 5.1.5. Security related configuration
    • 5.1.6. PHP Stream
    • 5.1.7. htaccess injection payload
    • 5.1.8. WebShell
    • 5.1.9. Code Obfuscation
    • 5.1.10. Phar
    • 5.1.11. Sink
    • 5.1.12. Other
    • 5.1.13. Version Security Changes
    • 5.1.14. Tricks
    • 5.1.15. Reference Links
  • 5.2. Python
    • 5.2.1. Formatting Strings
    • 5.2.2. Deserialization
    • 5.2.3. Sandbox
    • 5.2.4. Framework
    • 5.2.5. Code Obfuscation
    • 5.2.6. Sink
    • 5.2.7. Reference Links
  • 5.3. Java
    • 5.3.1. Basic Concepts
    • 5.3.2. Class
    • 5.3.3. Some Run Options and Descriptions
    • 5.3.4. Framework
    • 5.3.5. Container
    • 5.3.6. Sandbox
    • 5.3.7. Deserialization
    • 5.3.8. RMI
    • 5.3.9. JNDI
    • 5.3.10. JDK
    • 5.3.11. Common Sink
    • 5.3.12. WebShell
    • 5.3.13. Reference Links
  • 5.4. JavaScript
    • 5.4.1. ECMAScript
    • 5.4.2. Engine
    • 5.4.3. WebAssembly
    • 5.4.4. Scope and Closures
    • 5.4.5. Strict Mode
    • 5.4.6. Asynchronous Mechanisms
    • 5.4.7. Prototype chain
    • 5.4.8. Sandbox escape
    • 5.4.9. Deserialization
    • 5.4.10. jsfuck cheat sheet
    • 5.4.11. Trick
    • 5.4.12. Others
    • 5.4.13. Reference Links
  • 5.5. Golang
    • 5.5.1. Golang Runtime
    • 5.5.2. String Handling
    • 5.5.3. Reference Links
  • 5.6. Ruby
    • 5.6.1. Reference Links
  • 5.7. ASP
    • 5.7.1. Introduction
    • 5.7.2. Reference Links
  • 5.8. PowerShell
    • 5.8.1. Execution strategy
    • 5.8.2. Obfuscation
    • 5.8.3. Common functions
    • 5.8.4. Reference Links
  • 5.9. Shell
    • 5.9.1. Introduction
    • 5.9.2. Metacharacters
    • 5.9.3. Wildcards
  • 5.10. CSharp
    • 5.10.1. Exploiting techniques
    • 5.10.2. Reference Links
Previous Next

© Copyright 2019-2022, WebSecurity.

Built with Sphinx using a theme provided by Read the Docs.