mirror of
https://github.com/HackTricks-wiki/hacktricks.git
synced 2025-10-10 18:36:50 +00:00
Translated ['src/generic-methodologies-and-resources/python/README.md',
This commit is contained in:
parent
d3c907f4fa
commit
86f3267118
@ -5,8 +5,8 @@
|
||||
**チェックする興味深いページ:**
|
||||
|
||||
- [**Pyscript hacking tricks**](pyscript.md)
|
||||
- [**Python deserializations**](../../pentesting-web/deserialization/index.html#python)
|
||||
- [**Tricks to bypass python sandboxes**](bypass-python-sandboxes/index.html)
|
||||
- [**Python deserializations**](../../pentesting-web/deserialization/README.md)
|
||||
- [**Tricks to bypass python sandboxes**](bypass-python-sandboxes/README.md)
|
||||
- [**Basic python web requests syntax**](web-requests.md)
|
||||
- [**Basic python syntax and libraries**](basic-python.md)
|
||||
|
||||
|
@ -4,22 +4,22 @@
|
||||
|
||||
## Pythonを使用したサーバー
|
||||
|
||||
関数 _str()_ を使用して、可能な **コード実行** をテストします:
|
||||
可能な**コード実行**をテストするには、関数 _str()_ を使用します:
|
||||
```python
|
||||
"+str(True)+" #If the string True is printed, then it is vulnerable
|
||||
```
|
||||
### トリック
|
||||
### Tricks
|
||||
|
||||
{{#ref}}
|
||||
../../generic-methodologies-and-resources/python/bypass-python-sandboxes/
|
||||
../../generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md
|
||||
{{#endref}}
|
||||
|
||||
{{#ref}}
|
||||
../../pentesting-web/ssti-server-side-template-injection/
|
||||
../../pentesting-web/ssti-server-side-template-injection/README.md
|
||||
{{#endref}}
|
||||
|
||||
{{#ref}}
|
||||
../../pentesting-web/deserialization/
|
||||
../../pentesting-web/deserialization/README.md
|
||||
{{#endref}}
|
||||
|
||||
{{#include ../../banners/hacktricks-training.md}}
|
||||
|
Loading…
x
Reference in New Issue
Block a user