{"published":"2007-07-28 00:00:03","version":"1.0","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fnaoe.hatenadiary.org%2Fentry%2F20070728%2Fp4\" title=\"  - naoe\u306e\u65e5\u8a18\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","categories":["sec-summary","\u30c4\u30fc\u30eb\u30fb\u30ea\u30ea\u30fc\u30b9\u60c5\u5831"],"author_url":"https://blog.hatena.ne.jp/naoe/","provider_url":"https://hatena.blog","height":"190","description":"Web Security Threat Classification http://www.webappsec.org/projects/threat/ \uff03\u3044\u3064\u306e\u9593\u306b\u304b\u65e5\u672c\u8a9e\u8a33\u30d0\u30fc\u30b8\u30e7\u30f3\u304c\u3042\u308b\uff0e\u6614\u304b\u3089\u3042\u3063\u305f\u3063\u3051\u306a\uff1f\uff1f \uff03\u3068\u3044\u3046\u3053\u3068\u3067\uff0c\u65e5\u672c\u8a9e\u306e\u307b\u3046\u304c\u3044\u3044\u304b\u305f\u306b\u3068\u3063\u3066\u306f\u7d50\u69cb\u4f7f\u3048\u308b\u8cc7\u6599\u306b\u306a\u308a\u307e\u3057\u305f\u306d\uff0e \uff03\u82f1\u8a9e\u7248\u306f\u305d\u308d\u305d\u308d\u30d0\u30fc\u30b8\u30e7\u30f3\uff12\u304c\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u308b\u4e88\u5b9a\u3060\u305d\u3046\u3067\u3059\u3088 HIHAT The High Interaction Honeypot Analysis Toolkit (HIHAT) allows to transform arbitrary PHP applications into web-ba\u2026","type":"rich","blog_title":"naoe\u306e\u65e5\u8a18","image_url":null,"url":"https://naoe.hatenadiary.org/entry/20070728/p4","width":"100%","author_name":"naoe","blog_url":"https://naoe.hatenadiary.org/","provider_name":"Hatena Blog","title":" "}