-
Notifications
You must be signed in to change notification settings - Fork 337
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
4 changed files
with
45 additions
and
21 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,28 +1,30 @@ | ||
# PHP-Audit-Labs | ||
|
||
[![language](/icon/language.svg)](#) [![PHP-Code-Review](/icon/PHP-Code-Review.svg)](#) [![license](/icon/license.svg)](#) | ||
|
||
大家好,我们是红日安全-代码审计小组。此项目是关于代码审计的系列文章分享,还包含一个CTF靶场供大家练习,我们给这个项目起了一个名字叫 **PHP-Audit-Labs** ,希望对想要学习代码审计的朋友们有所帮助。如果你愿意加入我们,一起完善这个项目,欢迎通过邮件形式(**[email protected]**)联系我们。 | ||
|
||
## Part1 | ||
|
||
**Part1** 部分属于项目 **第一阶段** 的内容,本阶段的内容题目素材均来自 [PHP SECURITY CALENDAR 2017](https://www.ripstech.com/php-security-calendar-2017/) 。对于每一道题目,我们均给出对应的分析,并结合实际CMS进行解说。在文章的最后,我们还会留一道CTF题目,供大家练习,文章内容如下: | ||
|
||
* [ [红日安全]代码审计Day1 - in_array函数缺陷 ](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day1/files/README.md) | ||
* [ [红日安全]代码审计Day2 - filter_var函数缺陷](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day2/files/README.md) | ||
* [ [红日安全]代码审计Day3 - 实例化任意对象漏洞 ](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day3/files/README.md) | ||
* [ [红日安全]代码审计Day4 - strpos使用不当引发漏洞 ](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day4/files/README.md) | ||
* [ [红日安全]代码审计Day5 - escapeshellarg与escapeshellcmd使用不当 ](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day5/files/README.md) | ||
* [ [红日安全]代码审计Day6 - 正则使用不当导致的路径穿越问题 ](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day6/files/README.md) | ||
* [ [红日安全]代码审计Day7 - parse_str函数缺陷 ](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day7/files/README.md) | ||
* [ [红日安全]代码审计Day8 - preg_replace函数之命令执行 ](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day8/files/README.md) | ||
* [[红日安全]代码审计Day9 - str_replace函数过滤不当](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day9/files/README.md) | ||
* [[红日安全]代码审计Day10 - 程序未恰当exit导致的问题](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day10/files/README.md) | ||
* [[红日安全]代码审计Day11 - unserialize反序列化漏洞](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day11/files/README.md) | ||
* [[红日安全]代码审计Day12 - 误用htmlentities函数引发的漏洞](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day12/files/README.md) | ||
* [[红日安全]代码审计Day13 - 特定场合下addslashes函数的绕过](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day13/files/README.md) | ||
* [[红日安全]代码审计Day14 - 从变量覆盖到getshell](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day14/files/README.md) | ||
* [[红日安全]代码审计Day15 - $_SERVER['PHP_SELF']导致的防御失效问题](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day15/files/README.md) | ||
* [[红日安全]代码审计Day16 - 深入理解$_REQUESTS数组](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day16/files/README.md) | ||
* [[红日安全]代码审计Day17 - Raw MD5 Hash引发的注入](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/Part1/Day17/files/README.md) | ||
* [ [红日安全]代码审计Day1 - in_array函数缺陷](/Part1/Day1/files/README.md) | ||
* [ [红日安全]代码审计Day2 - filter_var函数缺陷](/Part1/Day2/files/README.md) | ||
* [ [红日安全]代码审计Day3 - 实例化任意对象漏洞](/Part1/Day3/files/README.md) | ||
* [ [红日安全]代码审计Day4 - strpos使用不当引发漏洞](/Part1/Day4/files/README.md) | ||
* [ [红日安全]代码审计Day5 - escapeshellarg与escapeshellcmd使用不当](/Part1/Day5/files/README.md) | ||
* [ [红日安全]代码审计Day6 - 正则使用不当导致的路径穿越问题](/Part1/Day6/files/README.md) | ||
* [ [红日安全]代码审计Day7 - parse_str函数缺陷](/Part1/Day7/files/README.md) | ||
* [ [红日安全]代码审计Day8 - preg_replace函数之命令执行](/Part1/Day8/files/README.md) | ||
* [[红日安全]代码审计Day9 - str_replace函数过滤不当](/Part1/Day9/files/README.md) | ||
* [[红日安全]代码审计Day10 - 程序未恰当exit导致的问题](/Part1/Day10/files/README.md) | ||
* [[红日安全]代码审计Day11 - unserialize反序列化漏洞](/Part1/Day11/files/README.md) | ||
* [[红日安全]代码审计Day12 - 误用htmlentities函数引发的漏洞](/Part1/Day12/files/README.md) | ||
* [[红日安全]代码审计Day13 - 特定场合下addslashes函数的绕过](/Part1/Day13/files/README.md) | ||
* [[红日安全]代码审计Day14 - 从变量覆盖到getshell](/Part1/Day14/files/README.md) | ||
* [[红日安全]代码审计Day15 - $_SERVER['PHP_SELF']导致的防御失效问题](/Part1/Day15/files/README.md) | ||
* [[红日安全]代码审计Day16 - 深入理解$_REQUESTS数组](/Part1/Day16/files/README.md) | ||
* [[红日安全]代码审计Day17 - Raw MD5 Hash引发的注入](/Part1/Day17/files/README.md) | ||
|
||
## Part2 | ||
|
||
|
@@ -39,10 +41,10 @@ | |
|
||
## PHP-Audit-Labs题解 | ||
|
||
* [[红日安全]PHP-Audit-Labs题解之Day1-4](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/PHP-Audit-Labs题解/Day1-4/files/README.md) | ||
* [[红日安全]PHP-Audit-Labs题解之Day5-8](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/PHP-Audit-Labs题解/Day5-8/files/README.md) | ||
* [[红日安全]PHP-Audit-Labs题解之Day9-12](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/PHP-Audit-Labs题解/Day9-12/files/README.md) | ||
* [[红日安全]PHP-Audit-Labs题解之Day13-16](https://github.com/hongriSec/PHP-Audit-Labs/blob/master/PHP-Audit-Labs题解/Day13-16/files/README.md) | ||
* [[红日安全]PHP-Audit-Labs题解之Day1-4](/PHP-Audit-Labs题解/Day1-4/files/README.md) | ||
* [[红日安全]PHP-Audit-Labs题解之Day5-8](/PHP-Audit-Labs题解/Day5-8/files/README.md) | ||
* [[红日安全]PHP-Audit-Labs题解之Day9-12](/PHP-Audit-Labs题解/Day9-12/files/README.md) | ||
* [[红日安全]PHP-Audit-Labs题解之Day13-16](/PHP-Audit-Labs题解/Day13-16/files/README.md) | ||
|
||
## 项目维护 | ||
|
||
|
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.