-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.php
183 lines (181 loc) · 7.96 KB
/
index.php
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
<?php
require('includes/functions.php');
echo getHeader('Homepage');
?>
<!-- Main jumbotron for a primary marketing message or call to action -->
<div class="jumbotron">
<div class="container">
<h1>Web Security Fundamentals</h1>
</div>
</div>
<div class="container homepage">
<!-- Example row of columns -->
<div class="row">
<div class="col-md-12">
<div class="col-md-4">
<div class="panel panel-default">
<div class="panel-heading">
<h4>Cross-Site Scripting (XSS)</h4>
</div>
<div class="panel-body">
<p>Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code.</p>
</div>
<div class="panel-footer">
<p><a class="btn btn-default" href="/cross-site-scripting" role="button">View demonstration »</a></p>
</div>
</div>
</div>
<div class="col-md-4">
<div class="panel panel-default">
<div class="panel-heading">
<h4>SQL Injection</h4>
</div>
<div class="panel-body">
<p>A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application.</p>
</div>
<div class="panel-footer">
<p><a class="btn btn-default" href="/sql-injection" role="button">View demonstration »</a></p>
</div>
</div>
</div>
<div class="col-md-4">
<div class="panel panel-default">
<div class="panel-heading">
<h4>Full Path Disclosure</h4>
</div>
<div class="panel-body">
<p>Full Path Disclosure (FPD) vulnerabilities enable the attacker to see the path to the webroot/file.</p>
</div>
<div class="panel-footer">
<p><a class="btn btn-default" href="/full-path-disclosure" role="button">View demonstration »</a></p>
</div>
</div>
</div>
</div>
<div class="col-md-12">
<div class="col-md-4">
<div class="panel panel-default">
<div class="panel-heading">
<h4>Arbitrary Code Execution</h4>
</div>
<div class="panel-body">
<p>Arbitrary Code Execution is used to describe an attacker's ability to execute any commands of the attacker's choice on a target machine or in a target process.</p>
</div>
<div class="panel-footer">
<p><a class="btn btn-default" href="/arbitrary-code-execution" role="button">View demonstration »</a></p>
</div>
</div>
</div>
<div class="col-md-4">
<div class="panel panel-default">
<div class="panel-heading">
<h4>Denial Of Service Attack (DoS)</h4>
</div>
<div class="panel-body">
<p>In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.</p>
</div>
<div class="panel-footer">
<p><a class="btn btn-default" href="/denial-of-service" role="button">View demonstration »</a></p>
</div>
</div>
</div>
<div class="col-md-4">
<div class="panel panel-default">
<div class="panel-heading">
<h4>Cross-site request forgery</h4>
</div>
<div class="panel-body">
<p>Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf) or XSRF, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.</p>
</div>
<div class="panel-footer">
<p><a class="btn btn-default" href="/cross-site-request-forgery" role="button">View demonstration »</a></p>
</div>
</div>
</div>
</div>
<div class="col-md-12">
<div class="col-md-4">
<div class="panel panel-default">
<div class="panel-heading">
<h4>Data Breach</h4>
</div>
<div class="panel-body">
<p>A data breach is the intentional or unintentional release of secure information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak and also data spill.</p>
</div>
<div class="panel-footer">
<p><a class="btn btn-default" href="/data-breach" role="button">View demonstration »</a></p>
</div>
</div>
</div>
<div class="col-md-4">
<div class="panel panel-default">
<div class="panel-heading">
<h4>Malware Distribution</h4>
</div>
<div class="panel-body">
<p>A Trojan Horse is a program that uses malicious code masqueraded as a trusted application. The malicious code can be injected on benign applications, masqueraded in e-mail links, or sometimes hidden in JavaScript pages to make furtive attacks against vulnerable internet Browsers.</p>
</div>
<div class="panel-footer">
<p><a class="btn btn-default" href="/malware-distribution" role="button">View demonstration »</a></p>
</div>
</div>
</div>
<div class="col-md-4">
<div class="panel panel-default">
<div class="panel-heading">
<h4>Local file inclusion</h4>
</div>
<div class="panel-body">
<p>Local File Inclusion (also known as LFI) is the process of including files, that are already locally present on the server, through the exploiting of vulnerable inclusion procedures implemented in the application.</p>
</div>
<div class="panel-footer">
<p><a class="btn btn-default" href="/local-file-inclusion" role="button">View demonstration »</a></p>
</div>
</div>
</div>
</div>
<div class="col-md-12">
<div class="col-md-4">
<div class="panel panel-default">
<div class="panel-heading">
<h4>Remote file inclusion</h4>
</div>
<div class="panel-body">
<p>Remote File Include (RFI) is an attack technique used to exploit "dynamic file include" mechanisms in web applications. When web applications take user input (URL, parameter value, etc.) and pass them into file include commands, the web application might be tricked into including remote files with malicious code.</p>
</div>
<div class="panel-footer">
<p><a class="btn btn-default" href="/remote-file-inclusion" role="button">View demonstration »</a></p>
</div>
</div>
</div>
<div class="col-md-4">
<div class="panel panel-default">
<div class="panel-heading">
<h4>Buffer overflow</h4>
</div>
<div class="panel-body">
<p>In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. This is a special case of violation of memory safety.</p>
</div>
<div class="panel-footer">
<p><a class="btn btn-default" href="/buffer-overflow" role="button">View demonstration »</a></p>
</div>
</div>
</div>
<div class="col-md-4">
<div class="panel panel-default">
<div class="panel-heading">
<h4>Memory corruption</h4>
</div>
<div class="panel-body">
<p>Referencing memory after it has been freed can cause a program to crash. The use of heap allocated memory after it has been freed or deleted leads to undefined system behavior</p>
</div>
<div class="panel-footer">
<p><a class="btn btn-default" href="/memory-corruption" role="button">View demonstration »</a></p>
</div>
</div>
</div>
</div>
</div>
<?php
echo getFooter();
?>