Articles: Web Application Security: Advanced CORS Exploitation Techniques

This commit is contained in:
pe3zx 2018-06-18 12:47:58 +07:00
parent 39e617b852
commit aa79b9e451

View File

@ -697,6 +697,10 @@ _return-to-libc techniques_
- [List of bug bounty writeups](List of bug bounty writeups) - [List of bug bounty writeups](List of bug bounty writeups)
- [The 2018 Guide to Building Secure PHP Software](https://paragonie.com/blog/2017/12/2018-guide-building-secure-php-software) - [The 2018 Guide to Building Secure PHP Software](https://paragonie.com/blog/2017/12/2018-guide-building-secure-php-software)
#### Web Application Security: CORS
- [Advanced CORS Exploitation Techniques](https://www.sxcurity.pro/advanced-cors-techniques/)
#### Web Application Security: Technique: Cross-site Request Forgery #### Web Application Security: Technique: Cross-site Request Forgery
- [What is CSRF , Preventions? And How to bypass the CSRF protection via XSS?](https://medium.com/@agrawalsmart7/what-is-csrf-how-to-bypass-the-csrf-protection-via-xss-55695f5789d7) - [What is CSRF , Preventions? And How to bypass the CSRF protection via XSS?](https://medium.com/@agrawalsmart7/what-is-csrf-how-to-bypass-the-csrf-protection-via-xss-55695f5789d7)
@ -2070,4 +2074,4 @@ This repository lists most of the challenges used in the Google CTF 2017. The mi
</tr> </tr>
</table> </table>
--- ---