{"id":332,"date":"2014-07-25T12:30:59","date_gmt":"2014-07-25T04:30:59","guid":{"rendered":"http:\/\/lihua.me\/zh\/?p=332"},"modified":"2014-08-08T00:17:21","modified_gmt":"2014-08-07T16:17:21","slug":"web-safety","status":"publish","type":"post","link":"https:\/\/lihua.me\/zh\/web-safety\/","title":{"rendered":"\u7f51\u7ad9\u5b89\u5168\u68c0\u6d4b"},"content":{"rendered":"<ul>\n<li><a href=\"http:\/\/www.eesafe.om\">eesafe<\/a><\/li>\n<li><a href=\"http:\/\/webscan.360.cn\/\">360\u7f51\u7ad9\u5b89\u5168\u68c0\u6d4b<\/a><\/li>\n<li><a href=\"http:\/\/www.mavitunasecurity.com\/communityedition\/\" target=\"_blank\">Netsparker Community Edition<\/a>\uff1aNetsparker Community Edition \u662f\u4e00\u6b3e SQL \u6ce8\u5165\u626b\u63cf\u5de5\u5177\uff0c\u662fNetsparker\u7684\u793e\u533a\u514d\u8d39\u7248\u672c\uff0c\u63d0\u4f9b\u4e86\u57fa\u672c\u7684\u6f0f\u6d1e\u68c0\u6d4b\u529f\u80fd\u3002\u4f7f\u7528\u53cb\u597d\uff0c\u7075\u6d3b\u3002<\/li>\n<li><a href=\"http:\/\/sourceforge.net\/projects\/wapiti\/\">Wapiti<\/a>\uff0cWapiti \u662f Web \u5e94\u7528\u7a0b\u5e8f\u6f0f\u6d1e\u68c0\u67e5\u5de5\u5177\u3002\u5b83\u5177\u6709\u201c\u6697\u7bb1\u64cd\u4f5c\u201d\u626b\u63cf\uff0c\u5373\u5b83\u4e0d\u5173\u5fc3 Web \u5e94\u7528\u7a0b\u5e8f\u7684\u6e90\u4ee3\u7801\uff0c\u4f46\u5b83\u4f1a\u626b\u63cf\u7f51\u9875\u7684\u90e8\u7f72\uff0c\u5bfb\u627e\u4f7f\u5176\u80fd\u591f\u6ce8\u5165\u6570\u636e\u7684\u811a\u672c\u548c\u683c\u5f0f\u3002<\/li>\n<li><a href=\"http:\/\/www.nstalker.com\/products\/editions\/free\/\">N-Stalker<\/a>\uff0cN-Stalker Web \u5e94\u7528\u7a0b\u5e8f\u5b89\u51682012\u514d\u8d39\u7248\u672c\u80fd\u591f\u4e3a\u60a8\u7684 Web \u5e94\u7528\u7a0b\u5e8f\u6e05\u9664\u8be5\u73af\u5883\u4e2d\u5927\u91cf\u5e38\u89c1\u7684\u6f0f\u6d1e\uff0c\u5305\u62ec\u8de8\u7ad9\u811a\u672c\uff08XSS\uff09\u3001SQL \u6ce8\u5165\uff08SQL injection\uff09\u3001\u7f13\u5b58\u6ea2\u51fa\uff08Buffer Overflow\uff09\u3001\u53c2\u6570\u7be1\u6539 \uff08Parameter Tampering\uff09\u7b49\u7b49\u3002<\/li>\n<li><a href=\"http:\/\/www.websecurify.com\/\">websecurify<\/a>\uff0c<\/li>\n<li><a href=\"http:\/\/labs.securitycompass.com\/exploit-me\/\">exploit-me<\/a>\uff0c<\/li>\n<\/ul>\n<p><a href=\"http:\/\/www.cnblogs.com\/lhb25\/archive\/2012\/06\/18\/8-useful-and-free-web-application-security-testing-tools.html\">more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>eesafe 360\u7f51\u7ad9\u5b89\u5168\u68c0\u6d4b Netsparker Community Edition\uff1aNetsparke &hellip; <a href=\"https:\/\/lihua.me\/zh\/web-safety\/\" class=\"more-link\">\u7ee7\u7eed\u9605\u8bfb<span class=\"screen-reader-text\">\u7f51\u7ad9\u5b89\u5168\u68c0\u6d4b<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","iawp_total_views":0,"footnotes":""},"categories":[322],"tags":[],"class_list":["post-332","post","type-post","status-publish","format-standard","hentry","category-pc"],"_links":{"self":[{"href":"https:\/\/lihua.me\/zh\/wp-json\/wp\/v2\/posts\/332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lihua.me\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lihua.me\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lihua.me\/zh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lihua.me\/zh\/wp-json\/wp\/v2\/comments?post=332"}],"version-history":[{"count":0,"href":"https:\/\/lihua.me\/zh\/wp-json\/wp\/v2\/posts\/332\/revisions"}],"wp:attachment":[{"href":"https:\/\/lihua.me\/zh\/wp-json\/wp\/v2\/media?parent=332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lihua.me\/zh\/wp-json\/wp\/v2\/categories?post=332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lihua.me\/zh\/wp-json\/wp\/v2\/tags?post=332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}