Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Talk:Vulnerability"
From NetSec
(Created page with "{{info|This is a research page. Feel free to contribute anything.}} == Vulnerability Research == Grepping for uses of potentially unsafe functions: * grep -rRiIn "strcat\|strc...") |
|||
Line 4: | Line 4: | ||
Grepping for uses of potentially unsafe functions: | Grepping for uses of potentially unsafe functions: | ||
* grep -rRiIn "strcat\|strcpy\|sprintf\|memcpy\|malloc\|calloc" /path/to/project | * grep -rRiIn "strcat\|strcpy\|sprintf\|memcpy\|malloc\|calloc" /path/to/project | ||
+ | |||
+ | Grepping for uses of mysql_query containing instances of the $_GET,$_POST,$_COOKIE, and $_REQUEST arrays from php | ||
+ | * grep -rRiIn mysql_query /path/to/project|grep "GET\|POST\|REQUEST\|COOKIE" |
Latest revision as of 14:45, 11 August 2012
This is a research page. Feel free to contribute anything. |
Vulnerability Research
Grepping for uses of potentially unsafe functions:
- grep -rRiIn "strcat\|strcpy\|sprintf\|memcpy\|malloc\|calloc" /path/to/project
Grepping for uses of mysql_query containing instances of the $_GET,$_POST,$_COOKIE, and $_REQUEST arrays from php
- grep -rRiIn mysql_query /path/to/project|grep "GET\|POST\|REQUEST\|COOKIE"