Preface: Over the last 18 months, the web application security community has concentrated our efforts on hacking Intranets through the use of web-browsers. Because corporate users sit behind firewalls they often have access to attack intranet applications on behalf of malicious users. Understanding the history of intranet hacking using browsers can aid in understanding why this is a problem, however it is not a prerequisite. Rather than using users as our attack vector, in this paper we'll be discussing how to use the website itself to proxy our attacks. The attack surface area is often larger than it appears because of how networks and websites are architected.
**Hidden Content: To see this hidden content your post count must be 30 or greater.**



ปล. ถ้าซ้ำหรือเคยมีคนเอามาลงแล้วแจ้งลบได้เลยนะครับ เพราะเป็นบทความนานพอสมควร และผมลอง search หาแล้วยังไม่มีครับ