본문 바로가기

hi.pe.kr2191

Varnish VCL language 가이드 I’ve been working with Varnish 2.0 for the last two weeks, going from complete n00b to someone who knows enough to feel I can improve the terrible lack of documentation for Varnish and VCL. There’s not a lot out there and what’s there is hard to find and sometimes erroneous. I’m hoping this post will help others like me who are struggling with Varnish and VCL. Basics VCL is essentially a set of .. 2010. 6. 1.
Testing for Directory Traversal Black Box testing and example (a) Input Vectors Enumeration In order to determine which part of the application is vulnerable to input validation bypassing, the tester needs to enumerate all parts of the application which accept content from the user. This also includes HTTP GET and POST queries and common options like file uploads and HTML forms. Here are some examples of the checks to be perfo.. 2010. 6. 1.
SQL Injection and Signature Evasion SQL-Injection: Attack-Types 2010. 5. 31.
URL Encoding Reference ASCII device control characters %00-%1f ASCII Character Description URL-encoding NUL null character %00 SOH start of header %01 STX start of text %02 ETX end of text %03 EOT end of transmission %04 ENQ enquiry %05 ACK acknowledge %06 BEL bell (ring) %07 BS backspace %08 HT horizontal tab %09 LF line feed %0A VT vertical tab %0B FF form feed %0C CR carriage return %0D SO shift out %0E SI shift in.. 2010. 5. 26.
sqlninja - a SQL Server injection & takeover tool Sqlninja's goal is to exploit SQL injection vulnerabilities on web applications that use Microsoft SQL Server as back end. It is released under the GPLv2. There are a lot of other SQL injection tools out there but sqlninja, instead of extracting the data, focuses on getting an interactive shell on the remote DB server and using it as a foothold in the target network. In a nutshell, here's what i.. 2010. 5. 25.