hread first html5,SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner

'

:version: 0.3.5

:shortname: csrf

:vector:

:class: Arachni::Element::Form

:type: :form

:url: http://testhtml5.vulnweb.com/

:source: |-

First Name

Last Name

Email Address

Subject

Choose One:

General Customer Service

Suggestions

Product Support

Message

Send

:inputs:

message: ''

firstName: ''

lastName: ''

address: ''

subject: na

butonul: ''

:default_inputs:

message: ''

firstName: ''

lastName: ''

address: ''

subject: na

butonul: ''

:action: http://testhtml5.vulnweb.com/contact

:method: :post

:affected_input_name:

:page:

:body: "

\n

\n \n\n\n\n\n \n SecurityTweets - HTML5

test website for Acunetix Web Vulnerability Scanner\n \n \n \n\n \n \n \n \n\n \n\n

\ \n\n\n\n\n

\n

\n

\n \n \n \n

\ \n\n logo2.png%5C%22\n

\

\n Vulnerable

HTML5 test website for Acunetix

Web Vulnerability Scanner.\n\n\n

\n \n Login\n

\ \n\n\n\n\n\n

\n

\n

\n

\

\n \n

Views\n

Website\n

Acunetix\n\n\n\n

\n

\n

\n

\n

\n First

Name\n \n Last Name\n \n

\ Email Address\n \n Subject\n

\ \n Choose One:\n General Customer Service\n Suggestions\n Product

Support\n\n\n

\n

\ Message\n \n\n\n

\ Send\n\n\n\n

\\n\n\n\n

\ \n\n

\n

unknown is coming from unknown

and has visited this page 4 times.\n\n\n \n

\

© Acunetix Ltd. 2013\n\n\n\n\n\n\n

\n \n

\

\n ��\n

Login\n

\\n

\n

\n

\ \n Username\n

\n

\ \n\n\n\n

\

\n \n

\ Password\n

\

\n \n

\\n\n\n

\n

\ Forgot Pwd?\n

\\n\n\n

\n Login\n Close\n\n

\\n\n\n\n\n\n

\n\n\n

\n\n\n

\n\n\n\n\n\n

\n\n\n

\n\n

\n

\n\n\n

\n\n\n

\n\n\n

\n\n\n\n\n\n"

:dom:

:url: http://testhtml5.vulnweb.com/#/contact

:transitions:

- :element: :page

:event: :load

:options:

:url: http://testhtml5.vulnweb.com/

:cookies: {}

:time: 1.063490473

- :element: http://testhtml5.vulnweb.com/

:event: :request

:options: {}

:time: 0.000726783

- :element: http://bxss.s3.amazonaws.com/ad.js

:event: :request

:options: {}

:time: 0.526492435

- :element: http://testhtml5.vulnweb.com/ajax/popular?offset=0

:event: :request

:options: {}

:time: 0.226042078

- :element:

:tag_name: :a

:attributes:

href: "#/contact"

data-arachni-id: "-1678787584"

:event: :click

:options: {}

:time: 1.172838548

:digest:

:data_flow_sinks: []

:execution_flow_sinks: []

:referring_page:

:body: "

\n

\n \n\n\n\n\n \n SecurityTweets - HTML5

test website for Acunetix Web Vulnerability Scanner\n \n \n \n\n \n \n \n \n\n \n\n

\ \n\n\n\n\n

\n

\n

\n \n \n \n

\ \n\n logo2.png%5C%22\n

\

\n Vulnerable

HTML5 test website for Acunetix

Web Vulnerability Scanner.\n\n\n

\n \n Login\n

\ \n\n\n\n\n\n

\n

\n

\n

\

\n \n

Views\n

Website\n

Acunetix\n\n\n\n

\n

\n

\n

\n

\n First

Name\n \n Last Name\n \n

\ Email Address\n \n Subject\n

\ \n Choose One:\n General Customer Service\n Suggestions\n Product

Support\n\n\n

\n

\ Message\n \n\n\n

\ Send\n\n\n\n

\\n\n\n\n

\ \n\n

\n

unknown is coming from unknown

and has visited this page 4 times.\n\n\n \n

\

© Acunetix Ltd. 2013\n\n\n\n\n\n\n

\n \n

\

\n ��\n

Login\n

\\n

\n

\n

\ \n Username\n

\n

\ \n\n\n\n

\

\n \n

\ Password\n

\

\n \n

\\n\n\n

\n

\ Forgot Pwd?\n

\\n\n\n

\n Login\n Close\n\n

\\n\n\n\n\n\n

\n\n\n

\n\n\n

\n\n\n\n\n\n

\n\n\n

\n\n

\n

\n\n\n

\n\n\n

\n\n\n

\n\n\n\n\n\n"

:dom:

:url: http://testhtml5.vulnweb.com/#/contact

:transitions:

- :element: :page

:event: :load

:options:

:url: http://testhtml5.vulnweb.com/

:cookies: {}

:time: 1.063490473

- :element: http://testhtml5.vulnweb.com/

:event: :request

:options: {}

:time: 0.000726783

- :element: http://bxss.s3.amazonaws.com/ad.js

:event: :request

:options: {}

:time: 0.526492435

- :element: http://testhtml5.vulnweb.com/ajax/popular?offset=0

:event: :request

:options: {}

:time: 0.226042078

- :element:

:tag_name: :a

:attributes:

href: "#/contact"

data-arachni-id: "-1678787584"

:event: :click

:options: {}

:time: 1.172838548

:digest:

:data_flow_sinks: []

:execution_flow_sinks: []

:remarks: {}

:trusted: true

:proof: |-

First Name

Last Name

Email Address

Subject

Choose One:

General Customer Service

Suggestions

Product Support

Message

Send

:cwe_url: http://cwe.mitre.org/data/definitions/352.html

:digest: 889065924

:response:

:url: http://testhtml5.vulnweb.com/

:code: 200

:ip_address: 176.28.50.165

:headers:

Server: nginx/1.4.1

Date: Thu, 01 Oct 2015 14:36:39 GMT

Content-Type: text/html; charset=utf-8

Transfer-Encoding: chunked

Connection: keep-alive

Access-Control-Allow-Origin: "*"

Content-Encoding: gzip

Content-Length: '10075'

:headers_string: "HTTP/1.1 200 OK\r\nServer: nginx/1.4.1\r\nDate: Thu, 01 Oct

2015 14:36:39 GMT\r\nContent-Type: text/html; charset=utf-8\r\nTransfer-Encoding:

chunked\r\nConnection: keep-alive\r\nAccess-Control-Allow-Origin: *\r\nContent-Encoding:

gzip\r\n\r\n"

:body: "

\n

\n \n\n\n\n\n \n SecurityTweets

- HTML5 test website for Acunetix Web Vulnerability Scanner\n \n \n \n\n

\ \n \n \n \n\n \n\n

\ \n\n\n\n\n

\n

\n

\n

\ \n \n

\ \n \n

\\n logo2.png%5C%22\n

\

\n Vulnerable

HTML5 test website for Acunetix Web Vulnerability

Scanner.\n\n\n

\n

\ \n Login\n \n\n\n

\\n\n\n

\n

\n

\

\n

\n

\ \n

Views\n

\

Website\n

Acunetix\n\n\n\n

\

\n

\n

\n\n\n

\\n\n \n\n

\n

\n\n\n

\ \n

© Acunetix Ltd. 2013\n

\\n\n\n\n\n\n

\n \n

\n ��\n

Login\n\n

\n

\

\n \n

\ Username\n

\

\n \n

\\n\n\n

\n

\ \n Password\n

\n

\ \n\n\n\n

\\n

\n Login\n

\ Close\n

\\n\n\n\n\n\n\n

\n\n\n

\n\n\n

\n\n\n\n\n\n

\n\n\n

\n\n\n

\n\n\n

\n\n\n

\n\n\n

\n\n\n\n\n\n"

:time: 0.183232

:total_time: 0.183232

:return_code: :ok

:return_message: No error

:request:

:url: http://testhtml5.vulnweb.com/

:parameters: {}

:headers:

User-Agent: Arachni/v1.3

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Encoding: gzip

Accept-Language: en-US,*

Host: testhtml5.vulnweb.com

:headers_string: "GET http://testhtml5.vulnweb.com/ HTTP/1.1\r\nUser-Agent: Arachni/v1.3\r\nAccept:

text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nX-Arachni-Browser-Auth:

0e378a6498d4810f4de69f3b0981fa12\r\nConnection: Keep-Alive\r\nAccept-Encoding:

gzip\r\nAccept-Language: en-US,*\r\nHost: testhtml5.vulnweb.com\r\n"

:effective_body:

:body:

:method: :get

- :name: Unvalidated DOM redirect

:description: |2

Web applications occasionally use DOM input values to store the address of the

page to which the client will be redirected -- for example:

`yoursite.com/#/?redirect=www.yoursite.com/404.asp`

An unvalidated redirect occurs when the client is able to modify the affected

parameter value and thus control the location of the redirection.

For example, the following URL `yoursite.com/#/?redirect=www.anothersite.com`

will redirect to `www.anothersite.com`.

Cyber-criminals will abuse these vulnerabilities in social engineering attacks

to get users to unknowingly visit malicious web sites.

Arachni has discovered that the web page does not validate the parameter value prior

to redirecting the client to the injected value.

:references:

OWASP Top 10 2010: https://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards

:tags:

- unvalidated

- redirect

- dom

- injection

:cwe: 819

:severity: :high

:remedy_guidance: |2

The application should ensure that the supplied value for a redirect is permitted.

This can be achieved by performing whitelisting on the parameter value.

The whitelist should contain a list of pages or sites that the application is

permitted to redirect users to. If the supplied value does not match any value

in the whitelist then the server should redirect to a standard error page.

:check:

:name: Unvalidated DOM redirect

:description: |2

Injects URLs and checks the browser URL to determine whether the attack was successful.

:elements:

- :link_dom

- :form_dom

- :cookie_dom

- :ui_form_dom

:author: Tasos "Zapotek" Laskos :version: 0.1.2

:shortname: unvalidated_redirect_dom

:vector:

:class: Arachni::Element::Link::DOM

:type: :link_dom

:url: http://testhtml5.vulnweb.com/

:source: 'The First JavaScript Misdirection Contest

: javahacker.com'

:affected_input_name: url

:affected_input_value: http://www.88fc8f0ec9141866cb14f3125be901b4.com/

:seed: http://www.88fc8f0ec9141866cb14f3125be901b4.com/

:inputs:

url: http://www.88fc8f0ec9141866cb14f3125be901b4.com/

:default_inputs:

url: http://javahacker.com/the-first-javascript-misdirection-contest/

:action: http://testhtml5.vulnweb.com/

:method: :get

:page:

:body: ''

:dom:

:url: http://www.88fc8f0ec9141866cb14f3125be901b4.com/

:transitions:

- :element: :page

:event: :load

:options:

:url: http://testhtml5.vulnweb.com/#/redir?url=http://www.88fc8f0ec9141866cb14f3125be901b4.com/

:cookies: {}

:time: 0.47153375

:digest:

:data_flow_sinks: []

:execution_flow_sinks: []

:referring_page:

:body: "

\n

\n \n\n\n\n\n \n SecurityTweets - HTML5

test website for Acunetix Web Vulnerability Scanner\n \n \n \n\n \n \n \n \n\n \n\n

\ \n\n\n\n\n

\n

\n

\n \n \n \n

\ \n\n logo2.png%5C%22\n

\

\n Vulnerable

HTML5 test website for Acunetix

Web Vulnerability Scanner.\n\n\n

\n \n Login\n

\ \n\n\n\n\n\n

\n

\n

\n

\

\n \n

Views\n

Website\n

Acunetix\n\n\n\n

\n

\n

\n Loading ...\n \n\n

\n

\n

\ \n\n\n

\n

Page\n 0\n

\\n\n\n

\n

Filtering for host\n

\\n\n\n

\n

\n

24e47eb911c4d9526f32bf4f7db3e47b.png%5C%22\n

\

\n

\n

\

\n\n\n\n

\

\n

\n

\ \n \n

\ \n\n

\\n The First JavaScript Misdirection Contest

: javahacker.com\n\n \n\n

\n

4 tweets from\n \n

\ @irsdl\n

\\n

\ @WisecWisec\n

\\n

\ @adam_baldwin\n

\\n

\ @seecurity\n

\\n\n\n\n

\

\n @irsdl

\n RT @peterjaric: The

winner of the JavaScript Misdirection Contest:\n@aymericbeaumet!\n\nCheck out

all entries at http://t.co/r38tRSqfo3 http:/…

\n\n

\\n\n

\n

\n

3bf174abb37bee6983637c6c2c63c5ac.png%5C%22\n

\

\n

\n

\

\n\n\n\n

\

\n

\n

\ \n \n

\ \n\n

\\n This New Campaign Wants To Help Surveillance

Agents Quit NSA or GCHQ | WIRED\n\n \n\n

\n

2 tweets from\n \n @stefant\n

\\n\n\n\n

\

\n @titanous

\n RT @csoghoian: This

is excellent. http://t.co/L1YY4g87OI http://t.co/wQ5XsgFYWD

\n\n

\\n\n

\n

\n

b4d50f99db49ff3d7d612a3b5e82b833.png%5C%22\n

\

\n

\n

\

\n\n\n\n

\

\n

\n

\ \n \n

\ \n\n

\\n An interesting detail about Control Flow

Guard | Bromium Labs\n\n \n\n

\n

2 tweets from\n \n

\ @ABazhaniuk\n

\\n

\ @matrosov\n

\\n\n\n\n

\

\n @ABazhaniuk

\n RT @ClausHoumann:

An interesting detail about Control Flow Guard http://t.co/XIuaRMABnH

\n

\\n\n\n

\n

\

\n

7906144d5b0e85adfdf752593fdc3da6.png%5C%22\n

\

\n

\n

\

\n\n\n\n

\

\n

\n

\ \n \n

\ \n\n

\\n Are you still using TrueCrypt? Beware of

these 2 critical flaws!Security Affairs\n\n \n\n

\n

2 tweets from\n \n @stamparm\n

\\n\n\n\n

\

\n @seecurity

\n RT @HenkvanRoest:

\"Are you still using TrueCrypt? Beware of these 2 critical flaws!\" http://t.co/gWMlyvog24

#security #feedly

\n\n\n\n

\n

\n

default.png%5C%22\n

\n

\n

\n\n\n\n

\n

\n

\ \n \n

\ \n\n

\\n untitled\n\n \n\n

\

\n

2 tweets

from\n \n @roo7break\n

\\n\n\n\n

\

\n @vegoshin

\n Advanced Threat

Tactics – Course and Notes http://t.co/zx2C8gN6LT

\n\n

\\n\n\n\n\n

\\n\n\n\n

\ \n\n

\n

unknown is coming from unknown

and has visited this page 1 times.\n\n\n \n

\

© Acunetix Ltd. 2013\n\n\n\n\n\n\n

\n \n

\

\n ��\n

Login\n

\\n

\n

\n

\ \n Username\n

\n

\ \n\n\n\n

\

\n \n

\ Password\n

\

\n \n

\\n\n\n

\n

\ Forgot Pwd?\n

\\n\n\n

\n Login\n Close\n\n

\\n\n\n\n\n\n

\n\n\n

\n\n\n

\n\n\n\n\n\n

\n\n\n

\n\n

\n

\n\n\n

\n\n\n

\n\n\n

\n\n\n\n\n\n"

:dom:

:url: http://testhtml5.vulnweb.com/#/popular

:transitions:

- :element: :page

:event: :load

:options:

:url: http://testhtml5.vulnweb.com/

:cookies: {}

:time: 1.063490473

- :element: http://testhtml5.vulnweb.com/

:event: :request

:options: {}

:time: 0.000726783

- :element: http://bxss.s3.amazonaws.com/ad.js

:event: :request

:options: {}

:time: 0.526492435

- :element: http://testhtml5.vulnweb.com/ajax/popular?offset=0

:event: :request

:options: {}

:time: 0.226042078

:digest:

:data_flow_sinks: []

:execution_flow_sinks: []

:remarks: {}

:trusted: true

:cwe_url: http://cwe.mitre.org/data/definitions/819.html

:digest: 707201679

:response:

:url: http://www.88fc8f0ec9141866cb14f3125be901b4.com/

:code: 0

:headers: {}

:body: ''

:time: 0.0

:request:

:url: http://www.88fc8f0ec9141866cb14f3125be901b4.com/

:parameters: {}

:headers: {}

:headers_string:

:effective_body:

:body:

:method: :get

- :name: Cross-Site Scripting (XSS)

:description: |2

Client-side scripts are used extensively by modern web applications.

They perform from simple functions (such as the formatting of text) up to full

manipulation of client-side data and Operating System interaction.

Cross Site Scripting (XSS) allows clients to inject scripts into a request and

have the server return the script to the client in the response. This occurs

because the application is taking untrusted data (in this example, from the client)

and reusing it without performing any validation or sanitisation.

If the injected script is returned immediately this is known as reflected XSS.

If the injected script is stored by the server and returned to any client visiting

the affected page, then this is known as persistent XSS (also stored XSS).

Arachni has discovered that it is possible to insert script content directly into

HTML element content.

:references:

ha.ckers: http://ha.ckers.org/xss.html

Secunia: http://secunia.com/advisories/9716/

WASC: http://projects.webappsec.org/w/page/13246920/Cross%20Site%20Scripting

OWASP: https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet

:tags:

- xss

- regexp

- injection

- script

:cwe: 79

:severity: :high

:remedy_guidance: |2

To remedy XSS vulnerabilities, it is important to never use untrusted or unfiltered

data within the code of a HTML page.

Untrusted data can originate not only form the client but potentially a third

party or previously uploaded file etc.

Filtering of untrusted data typically involves converting special characters to

their HTML entity encoded counterparts (however, other methods do exist, see references).

These special characters include:

* `&`

* ``

* `"`

* `'`

* `/`

An example of HTML entity encoding is converting ` '

:version: 0.4.4

:shortname: xss

:vector:

:class: Arachni::Element::Link

:type: :link

:url: http://testhtml5.vulnweb.com/

:source:

:affected_input_name: id

:affected_input_value: 24e47eb911c4d9526f32bf4f7db3e47b-->\n \n \n \n \n \n\n\n\n\n

\n

\n

\n

\ \n \n

\ \n \n

\\n logo2.png%5C%22\n

\

\n HTML5 test

website for Acunetix Web Vulnerability Scanner.\n\n\n

\\n\n\n

\n

\n

\

\n

\n

\ \n

Action\n

\

Acunetix\n\n\n\n

\

\n

\n \n

\ Your report was submitted, thanks. \n \n\n\n

\\n\n \n\n \n

© Acunetix

Ltd. 2013\n\n\n\n\n\n\n\n\n\n\n\n\n

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
好的,以下是一段使用RT-Thread连接阿里云平台IoT Hub的示例代码: ```c #include <rtthread.h> #include <mqtt.h> #define MQTT_CLIENTID "example-client" #define MQTT_USERNAME "your-username" #define MQTT_PASSWORD "your-password" #define MQTT_TOPIC "/a1yourproductkey/yourdevicename/user/update" #define MQTT_PAYLOAD "{\"test\": 123}" static rt_mqtt_client_t mqtt_client; static void mqtt_event_handler(rt_mqtt_client_t *client, rt_mqtt_event_e event, void *user_data) { switch (event) { case RT_MQTT_EVENT_CONNECTED: rt_kprintf("MQTT client connected\n"); rt_mqtt_publish(mqtt_client, MQTT_TOPIC, MQTT_PAYLOAD, strlen(MQTT_PAYLOAD), 0, 0); break; case RT_MQTT_EVENT_DISCONNECTED: rt_kprintf("MQTT client disconnected\n"); break; default: break; } } void mqtt_thread_entry(void *parameter) { rt_mqtt_client_t *client = &mqtt_client; rt_mqtt_topic_qos_t qos = RT_MQTT_QOS_LEVEL_0; rt_mqtt_connect_option_t connect_option = RT_MQTT_CONNECT_OPTION_DEFAULT; rt_mqtt_publish_option_t publish_option = RT_MQTT_PUBLISH_OPTION_DEFAULT; connect_option.clean_session = 1; connect_option.username = MQTT_USERNAME; connect_option.password = MQTT_PASSWORD; rt_mqtt_init(client, "mqtt://yourproductkey.iot-as-mqtt.cn-shanghai.aliyuncs.com:1883", mqtt_event_handler, RT_NULL); rt_mqtt_connect(client, &connect_option); rt_mqtt_subscribe(client, MQTT_TOPIC, qos); rt_mqtt_publish(client, MQTT_TOPIC, MQTT_PAYLOAD, strlen(MQTT_PAYLOAD), 0, 0); while (1) { rt_mqtt_yield(client, 1000); } } int mqtt_sample(void) { rt_thread_t thread = RT_NULL; thread = rt_thread_create("mqtt", mqtt_thread_entry, RT_NULL, 2048, 25, 10); if (thread != RT_NULL) { rt_thread_startup(thread); } return 0; } ``` 该代码通过MQTT协议连接到阿里云平台IoT Hub,并向指定的主题发布一条消息。需要注意的是,您需要将代码中的MQTT_CLIENTID、MQTT_USERNAME、MQTT_PASSWORD、MQTT_TOPIC和MQTT_PAYLOAD等参数替换为您自己的实际值。 其中,mqtt_thread_entry是一个线程函数,用于创建MQTT客户端并连接到阿里云平台IoT Hub。mqtt_event_handler是一个回调函数,用于处理MQTT客户端的事件,例如连接成功、断开连接等。mqtt_sample是一个示例函数,用于启动mqtt_thread_entry线程。 您可以将该代码添加到您的RT-Thread项目中,并根据实际需要进行调整和修改。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值