1+ <!doctype html>
2+
3+ < html lang ="en " xmlns:th ="http://www.thymeleaf.org ">
4+ < head >
5+ < meta charset ="UTF-8 ">
6+ < title > Java漏洞靶场</ title >
7+ < link rel ="
stylesheet "
href ="
https://cdn.jsdelivr.net/npm/[email protected] /dist/semantic.min.css "
> 8+ </ head >
9+ < body >
10+
11+ < div style ="padding: 40px;
12+ text-align: center;
13+ background: #1abc9c;
14+ color: white; ">
15+ < h1 > Java漏洞演示平台</ h1 >
16+ < button class ="ui inverted secondary basic button "> < a style ="color: white " href ="https://github.com/tangxiaofeng7/SecExample " target ="_blank "> 靶机源码</ a > </ button >
17+ </ div >
18+
19+
20+ < div style ="margin-top: 50px;margin-left: 25px;margin-right: 25px " class ="ui cards ">
21+ < div class ="card ">
22+ < div class ="content ">
23+ < div class ="header "> 注入漏洞-SQL注入</ div >
24+ < div class ="description "> SQL注入通过把SQL命令插入到Web表单提交或输入域名或页面请求的查询字符串,最终达到欺骗服务器执行指定的SQL语句</ div >
25+ </ div >
26+ < a class ="ui bottom attached button " th:href ="@{/sql} " > < i class ="add icon "> </ i > 测试漏洞</ a >
27+ </ div >
28+
29+ < div class ="card ">
30+ < div class ="content ">
31+ < div class ="header "> 注入漏洞-命令注入</ div >
32+ < div class ="description "> RCE (remote code execution):指用户通过浏览器提交执行命令,由于服务器端没有针对执行函数做过滤,导致在没有指定绝对路径的情况下就执行命令,可能会允许攻击者通过改变 $PATH 或程序执行环境的其他方面来执行一个恶意构造的代码。</ div >
33+ </ div >
34+ < a class ="ui bottom attached button " th:href ="@{/rce} " > < i class ="add icon "> </ i > 测试漏洞</ a >
35+ </ div >
36+
37+ < div class ="card ">
38+ < div class ="content ">
39+ < div class ="header "> 注入漏洞-spel表达式注入</ div >
40+ < div class ="description "> spel表达式注入 (Spring Expression Language):是一种功能强大的表达式语言,用于在运行时查询和操作对象图;语法上称为Unified EL,但提供了更多的特性,特别是方法调用和基本字符SpEL的生成是为了给Spring社区提供一种能够与Spring生态系统所有产品无缝对接,能提供一站式支持的表达式语言。</ div >
41+ </ div >
42+ < a class ="ui bottom attached button " th:href ="@{/spel} " > < i class ="add icon "> </ i > 测试漏洞</ a >
43+ </ div >
44+ < div class ="card ">
45+ < div class ="content ">
46+ < div class ="header "> XSS漏洞</ div >
47+ < div class ="description "> XSS(Cross Site Scripting):跨站脚本攻击是指恶意攻击者往Web页面里插入恶意Script代码,当用户浏览该页之时,嵌入其中Web里面的Script代码会被执行,从而达到恶意攻击用户的目的</ div >
48+ </ div >
49+ < a class ="ui bottom attached button " th:href ="@{/xss} " > < i class ="add icon "> </ i > 测试漏洞</ a >
50+ </ div >
51+
52+ < div class ="card ">
53+ < div class ="content ">
54+ < div class ="header "> CSRF漏洞</ div >
55+ < div class ="description "> CSRF(Cross-site request forgery):CSRF,跨站请求伪造,在受害者通过浏览器登录某个恶意URL的时候,通过伪造请求达到跨站请求伪造(常见于商城类网站或者自己开发的会员系统)</ div >
56+ </ div >
57+ < a class ="ui bottom attached button " th:href ="@{/csrf} " > < i class ="add icon "> </ i > 测试漏洞</ a >
58+ </ div >
59+
60+ < div class ="card ">
61+ < div class ="content ">
62+ < div class ="header "> SSRF漏洞</ div >
63+ < div class ="description "> SSRF(Server-Side Request Forgery):服务器端请求伪造是一种由攻击者构造形成由服务端发起请求的一个安全漏洞。一般情况下,SSRF攻击的目标是从外网无法访问的内部系统。</ div >
64+ </ div >
65+ < a class ="ui bottom attached button " th:href ="@{/ssrf} " > < i class ="add icon "> </ i > 测试漏洞</ a >
66+ </ div >
67+
68+ < div class ="card ">
69+ < div class ="content ">
70+ < div class ="header "> CORS漏洞</ div >
71+ < div class ="description "> CORS(Cross-origin resource sharing)。因为出于安全的考虑, 浏览器不允许Ajax调用当前源之外的资源.,即浏览器的同源策略,但一个请求url的协议、域名、端口三者之间任意一个与当前页面不同即为跨域、它允许阅览器向跨源服务器发送XMLHttpRequest请求,从而克服AJAX只能同源使用的限制</ div >
72+ </ div >
73+ < a class ="ui bottom attached button " th:href ="@{/cors1} " > < i class ="add icon "> </ i > 测试漏洞</ a >
74+ </ div >
75+
76+ < div class ="card ">
77+ < div class ="content ">
78+ < div class ="header "> 反序列化漏洞-Fastjson反序列化</ div >
79+ < div class ="description "> 序列化和反序列化本身并不存在问题。但当输入的反序列化的数据可被用户控制,那么攻击者即可通过构造恶意输入,让反序列化产生非预期的对象,在此过程中执行构造的任意代码。</ div >
80+ </ div >
81+ < a class ="ui bottom attached button " th:href ="@{/fastjson} " > < i class ="add icon "> </ i > 测试漏洞</ a >
82+ </ div >
83+
84+
85+
86+ < div class ="card ">
87+ < div class ="content ">
88+ < div class ="header "> 验证码相关漏洞</ div >
89+ < div class ="description "> 短信回显< br > 短信轰炸< br > 前端绕过验证< br > 验证码爆破</ div >
90+ </ div >
91+ < a class ="ui bottom attached button " th:href ="@{/messageecho} " > < i class ="add icon "> </ i > 测试漏洞</ a >
92+ </ div >
93+
94+ </ div >
95+
96+
97+ </ body >
98+ </ html >
0 commit comments