{"height":"190","published":"2025-09-22 10:53:57","provider_url":"https://hatena.blog","version":"1.0","blog_title":"Shikata Ga Nai","author_url":"https://blog.hatena.ne.jp/ThisIsOne/","description":"Lab: Exploiting path delimiters for web cache deception \u2014 \u89e3\u8aac\u3068\u624b\u9806\uff08PRACTITIONER\u30fb\u30a2\u30a6\u30c8\u30e9\u30a4\u30f3\u7d71\u4e00\u7248\uff09 \u52d5\u753b youtu.be 1. \u30bf\u30a4\u30c8\u30eb Lab: Exploiting path delimiters for web cache deception \u2014 \u30d1\u30b9\u533a\u5207\u308a\u6587\u5b57\u306e\u89e3\u91c8\u5dee\u7570\u3092\u7a81\u3044\u3066 API \u30ad\u30fc\u3092\u596a\u53d6 2. \u6ce8\u610f\u66f8\u304d \u91cd\u8981\uff1a\u5b66\u7fd2\u76ee\u7684\u306e\u307f\u3002\u30e9\u30dc\u4ee5\u5916\u3067\u306e\u5b9f\u65bd\u306f\u7981\u6b62\u3002 3. \u6982\u8981 \u3053\u306e\u30e9\u30dc\u306f\u3001\u30aa\u30ea\u30b8\u30f3\u30b5\u30fc\u30d0\u3068\u30ad\u30e3\u30c3\u30b7\u30e5\uff08CDN/\u30ea\u30d0\u30fc\u30b9\u30d7\u30ed\u30ad\u30b7\uff09\u304c URL \u306e\u201c\u533a\u5207\u308a\u6587\u5b57\uff08delimiter\uff09\u201d \u3092 \u7570\u306a\u308b\u898f\u5247\u3067\u89e3\u91c8\u3059\u2026","categories":["Web Security Academy","Web Cache"],"width":"100%","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fcysec148.hatenablog.com%2Fentry%2F2025%2F09%2F22%2F105357\" title=\"Lab: Exploiting path delimiters for web cache deception \u2014 \u89e3\u8aac\u3068\u624b\u9806 - Shikata Ga Nai\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","title":"Lab: Exploiting path delimiters for web cache deception \u2014 \u89e3\u8aac\u3068\u624b\u9806","url":"https://cysec148.hatenablog.com/entry/2025/09/22/105357","author_name":"ThisIsOne","provider_name":"Hatena Blog","image_url":null,"blog_url":"https://cysec148.hatenablog.com/","type":"rich"}