- 扫描 ID:
- bb2e9878-e66c-4116-96fb-701d1216879b已完成
- 提交的 URL:
- https://oast.live/
- 报告完成时间:
链接 · 找到 1 个
从页面中识别出的传出链接
链接 | 文本 |
---|---|
https://github.com/projectdiscovery/interactsh | Interactsh |
JavaScript 变量 · 找到 3 个
在页面窗口对象上加载的全局 JavaScript 变量是在函数外部声明的变量,可以从当前范围内的代码中的任何位置访问
名称 | 类型 |
---|---|
onbeforetoggle | object |
documentPictureInPicture | object |
onscrollend | object |
控制台日志消息 · 找到 0 条
记录到 Web 控制台的消息
HTML
页面的原始 HTML 正文
<html><head></head><body><h1> Interactsh Server </h1>
<a href="https://github.com/projectdiscovery/interactsh"><b>Interactsh</b></a> is an open-source tool for detecting out-of-band interactions. It is a tool designed to detect vulnerabilities that cause external interactions.<br><br>
If you notice any interactions from <b>*.oast.live</b> in your logs, it's possible that someone (internal security engineers, pen-testers, bug-bounty hunters) has been testing your application.<br><br>
You should investigate the sites where these interactions were generated from, and if a vulnerability exists, examine the root cause and take the necessary steps to mitigate the issue.
</body></html>