fileNameWithoutExtension()
regularExpression(regularExpression(regularExpression(regularExpression(capitalize(fileRelativePath()), "\/", "\\\\"), "(.php)", ""), fileNameWithoutExtension(), "\\\\"), "\\\\\\\\", "")
| <?php | |
| trait WithAuth | |
| { | |
| use WithUser; | |
| public function getJson($uri, array $headers = [], $options = 0) | |
| { | |
| $this->actingAs(); | |
| return parent::getJson($uri, $headers, $options); |
| <?php | |
| use Atproto\Client; | |
| use Atproto\DataModel\Blob\Blob; | |
| use Atproto\Lexicons\App\Bsky\Embed\Video; | |
| use Atproto\Responses\App\Bsky\Video\UploadVideoResponse; | |
| use Atproto\Support\FileSupport; | |
| // Authenticate the client with Bluesky credentials | |
| $client = new Client(); |
| <?php | |
| namespace Tests\LinkedList\Unit; | |
| ini_set('memory_limit', '512M'); | |
| use PHPUnit\Framework\TestCase; | |
| use SplDoublyLinkedList; | |
| class LinkedListTest extends TestCase |
Website error messages are great resources for collating this information to build our list of valid usernames. We have a form to create a new user account if we go to the Acme IT Support website (http://MACHINE_IP/customers/signup) signup page.
If you try entering the username admin and fill in the other form fields with fake information, you'll see we get the error An account with this username already exists. We can use the existence of this error message to produce a list of valid usernames already signed up on the system by using the ffuf tool below. The ffuf tool uses a list of commonly used usernames to check against for any matches.
When an SSL/TLS (Secure Sockets Layer/Transport Layer Security) certificate is created for a domain by a CA (Certificate Authority), CA's take part in what's called "Certificate Transparency (CT) logs". These are publicly accessible logs of every SSL/TLS certificate created for a domain name. The purpose of Certificate Transparency logs is to stop malicious and accidentally made certificates from being used. We can use this service to our advantage to discover subdomains belonging to a domain, sites like https://crt.sh and https://ui.ctsearch.entrust.com/ui/ctsearchui offer a searchable database of certificates that shows current and historical results.
Firstly, we should ask, in the context of web application security, what is content? Content can be many things, a file, video, picture, backup, a website feature. When we talk about content discovery, we're not talking about the obvious things we can see on a website; it's the things that aren't immediately presented to us and that weren't always intended for public access.
This content could be, for example, pages or portals intended for staff usage, older versions of the website, backup files, configuration files, administration panels, etc.
There are three main ways of discovering content on a website which we'll cover. Manually, Automated and OSINT (Open-Source Intelligence).
PAM, sistemlər üzərindəki kritik önəmə sahib resurslara access əldə etməyi əhatə edən, bu prosesləri idarə edən metodologiya. Bir qurum daxilindəki kritik bir resursa əlçatanlıqla bağlı prosedurları idarə etməyi ifadə edir.
PIM, sistemlər üzərindəki kritik önəmə sahib hesablara access əldə etməyi əhatə edən, bu prosesləri idarə edən metodologiya. Bir istifadəçinin bir qurum daxilindəki rolunu sistemdə bir rola çevirməyi ifadə edir.
| <?php | |
| namespace App\Http\Requests\Folder; | |
| use Illuminate\Foundation\Http\FormRequest; | |
| use function PHPUnit\Framework\callback; | |
| class StoreFolderRequest extends FormRequest | |
| { | |
| public function rules(): array |