<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>靶场 &#8211; ChaBug安全</title>
	<atom:link href="/tags/%E9%9D%B6%E5%9C%BA/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Fri, 10 Aug 2018 03:41:06 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>PHP-Audit-Labs：一个适合新手PHP代码审计的项目</title>
		<link>/web/524.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Fri, 10 Aug 2018 03:20:11 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[编程学习]]></category>
		<category><![CDATA[代码审计]]></category>
		<category><![CDATA[靶场]]></category>
		<guid isPermaLink="false">/?p=524</guid>

					<description><![CDATA[PHP-Audit-Labs 此项目是@红日安全 关于代码审计的系列文章分享，还包含一个CTF靶场供大家练习 Part1 Part1部分属于项目 第一阶段 的内容，本阶段的内容题目...]]></description>
										<content:encoded><![CDATA[<h1></h1>
<h1>PHP-Audit-Labs</h1>
<p>此项目是@红日安全 关于<span class="wpcom_tag_link"><a href="/tags/%e4%bb%a3%e7%a0%81%e5%ae%a1%e8%ae%a1" title="代码审计" target="_blank">代码审计</a></span>的系列文章分享，还包含一个CTF<span class="wpcom_tag_link"><a href="/tags/%e9%9d%b6%e5%9c%ba" title="靶场" target="_blank">靶场</a></span>供大家练习</p>
<h1><a id="user-content-part1" class="anchor" href="https://github.com/hongriSec/PHP-Audit-Labs/blob/master/README.md#part1" aria-hidden="true"></a>Part1</h1>
<p>Part1部分属于项目 <strong>第一阶段</strong> 的内容，本阶段的内容题目素材均来自 <a href="https://www.ripstech.com/php-security-calendar-2017/" rel="nofollow">PHP SECURITY CALENDAR 2017</a> 。对于每一道题目，我们均给出对应的分析，并结合实际CMS进行解说。在文章的最后，我们还会留一道CTF题目，供大家练习，文章内容如下：</p>
<h3><a href="https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day1/files/README.md">[红日安全]代码审计Day1 &#8211; in_array函数缺陷</a></h3>
<h3><a href="https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day2/files/README.md">[红日安全]代码审计Day2 &#8211; filter_var函数缺陷</a></h3>
<h3><a href="https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day3/files/README.md">[红日安全]代码审计Day3 &#8211; 实例化任意对象漏洞</a></h3>
<h3><a href="https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day4/files/README.md">[红日安全]代码审计Day4 &#8211; strpos使用不当引发漏洞</a></h3>
<h3><a href="https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day5/files/README.md">[红日安全]代码审计Day5 &#8211; escapeshellarg与escapeshellcmd使用不当</a></h3>
<h3><a href="https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day6/files/README.md">[红日安全]代码审计Day6 &#8211; 正则使用不当导致的路径穿越问题</a></h3>
<h3><a href="https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day7/files/README.md">[红日安全]代码审计Day7 &#8211; parse_str函数缺陷</a></h3>
<h1><a id="user-content-php-audit-labs题解" class="anchor" href="https://github.com/hongriSec/PHP-Audit-Labs/blob/master/README.md#php-audit-labs%E9%A2%98%E8%A7%A3" aria-hidden="true"></a>PHP-Audit-Labs题解</h1>
<h3><a href="https://github.com/hongriSec/PHP-Audit-Labs/blob/master/PHP-Audit-Labs%E9%A2%98%E8%A7%A3/Day1-4/files/README.md">[红日安全]PHP-Audit-Labs题解之Day1-4</a></h3>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>upload-labs：一个帮你总结所有类型的上传漏洞的靶场</title>
		<link>/tools/469.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Tue, 24 Jul 2018 06:39:20 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[上传]]></category>
		<category><![CDATA[突破]]></category>
		<category><![CDATA[靶场]]></category>
		<guid isPermaLink="false">/?p=469</guid>

					<description><![CDATA[upload-labs 一个帮你总结所有类型的上传漏洞的靶场 运行环境 操作系统：推荐windows（除了Pass-19必须在linux下，其余Pass都可以在windows上运行...]]></description>
										<content:encoded><![CDATA[<h1>upload-labs</h1>
<p>一个帮你总结所有类型的<span class="wpcom_tag_link"><a href="/tags/%e4%b8%8a%e4%bc%a0" title="上传" target="_blank">上传</a></span>漏洞的<span class="wpcom_tag_link"><a href="/tags/%e9%9d%b6%e5%9c%ba" title="靶场" target="_blank">靶场</a></span></p>
<p><a href="https://github.com/c0ny1/upload-labs/blob/master/doc/mind-map.png" target="_blank" rel="noopener"><img src="https://github.com/c0ny1/upload-labs/raw/master/doc/mind-map.png" alt="" /></a></p>
<h2><a id="user-content-运行环境" class="anchor" href="https://github.com/c0ny1/upload-labs#%E8%BF%90%E8%A1%8C%E7%8E%AF%E5%A2%83" aria-hidden="true"></a>运行环境</h2>
<pre><code>操作系统：推荐windows（除了Pass-19必须在linux下，其余Pass都可以在windows上运行）
php版本：推荐5.2.17(其他版本可能会导致部分Pass无法突破)
php组件：php_gd2,php_exif（部分Pass需要开启这两个组件）
apache：以moudel方式连接
</code></pre>
<p>PS：为了节省时间，可下载<a href="https://github.com/c0ny1/upload-labs/releases">Windows下集成环境</a>，解压即可运行靶机环境。</p>
<h2><a id="user-content-使用" class="anchor" href="https://github.com/c0ny1/upload-labs#%E4%BD%BF%E7%94%A8" aria-hidden="true"></a>使用</h2>
<p>1.主界面</p>
<p><a href="https://github.com/c0ny1/upload-labs/blob/master/doc/index.jpg" target="_blank" rel="noopener"><img src="https://github.com/c0ny1/upload-labs/raw/master/doc/index.jpg" alt="主界面" /></a></p>
<p>2.每一关</p>
<p><a href="https://github.com/c0ny1/upload-labs/blob/master/doc/pass.jpg" target="_blank" rel="noopener"><img src="https://github.com/c0ny1/upload-labs/raw/master/doc/pass.jpg" alt="每一关" /></a></p>
<p>3.查看代码</p>
<p><a href="https://github.com/c0ny1/upload-labs/blob/master/doc/code.jpg" target="_blank" rel="noopener"><img src="https://github.com/c0ny1/upload-labs/raw/master/doc/code.jpg" alt="代码" /></a></p>
<h2><a id="user-content-总结" class="anchor" href="https://github.com/c0ny1/upload-labs#%E6%80%BB%E7%BB%93" aria-hidden="true"></a>总结</h2>
<p><a href="https://github.com/c0ny1/upload-labs/blob/master/doc/sum_up.png" target="_blank" rel="noopener"><img src="https://github.com/c0ny1/upload-labs/raw/master/doc/sum_up.png" alt="判断上传漏洞类型" /></a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
