
-
作者Chris Anastasio
-
简介
- •Brief intro to WCF•WCF target enumeration
- •Example vulnerable service
- •Real world vulnerability analysis and exploitation
- •DEMO
-
援引https://mp.weixin.qq.com/s?__biz=MzIxMjEwNTc4NA==&mid=2652989497&idx=1&sn=d09ad7f6a895ff68cf39af048414d343&pass_ticket=dI0H0tfLOBKERWbLGYumQY6l4KVEsQvrhTsyF7qan1TOTFIEl%2FAFnccu5bE87Ea5
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2018-04-26 02:29:57
-
2016-02-20 16:19:43
-
2019-04-27 02:15:12
-
2016-06-18 02:42:33
附件下载
-
Abusing.WCF.Endpoints.for.RCE.and.Privilege.Escalation.pdf