{"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fcysec148.hatenablog.com%2Fentry%2F2025%2F09%2F22%2F070823\" title=\"Lab: Exploiting path mapping for web cache deception \u2014 \u89e3\u8aac\u3068\u624b\u9806 - Shikata Ga Nai\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","url":"https://cysec148.hatenablog.com/entry/2025/09/22/070823","blog_url":"https://cysec148.hatenablog.com/","blog_title":"Shikata Ga Nai","author_name":"ThisIsOne","image_url":null,"categories":["Web Security Academy","Web Cache"],"title":"Lab: Exploiting path mapping for web cache deception \u2014 \u89e3\u8aac\u3068\u624b\u9806","provider_name":"Hatena Blog","type":"rich","published":"2025-09-22 07:08:23","provider_url":"https://hatena.blog","description":"Hello there, ('\u03c9')\u30ce \u52d5\u753b youtu.be 1. \u30bf\u30a4\u30c8\u30eb Lab: Exploiting path mapping for web cache deception \u2014 \u30d1\u30b9\u6b63\u898f\u5316\u306e\u5dee\u7570\u3092\u7a81\u3044\u305f Web Cache Deception \u3067 API \u30ad\u30fc\u3092\u596a\u53d6 2. \u6ce8\u610f\u66f8\u304d \u91cd\u8981\uff1a\u3053\u306e\u624b\u9806\u306f\u5b66\u7fd2\u76ee\u7684\u3067\u3042\u308a\u3001\u30e9\u30dc\u4ee5\u5916\u306e\u74b0\u5883\u3067\u7d76\u5bfe\u306b\u5b9f\u884c\u3057\u306a\u3044\u3067\u304f\u3060\u3055\u3044\u3002 3. \u6982\u8981\uff08\u3053\u306e\u6587\u66f8\u3067\u4f55\u3092\u5b66\u3079\u308b\u304b\uff09 \u3053\u306e\u30e9\u30dc\u3067\u306f\u3001\u30aa\u30ea\u30b8\u30f3\u30b5\u30fc\u30d0\uff08\u30a2\u30d7\u30ea\uff09\u3068CDN/\u30ea\u30d0\u30fc\u30b9\u30d7\u30ed\u30ad\u30b7\u306e\u30ad\u30e3\u30c3\u30b7\u30e5\u304c URL \u30d1\u30b9\u306e\u89e3\u91c8\uff08\u6b63\u898f\u5316\uff09\u3092\u7570\u306a\u308b\u898f\u5247\u3067\u884c\u3046\u3053\u3068\u3092\u7a81\u304f Web Cache Deception (WCD)\u2026","height":"190","version":"1.0","author_url":"https://blog.hatena.ne.jp/ThisIsOne/","width":"100%"}