- 掃描 ID:
- bb2e9878-e66c-4116-96fb-701d1216879b已完成
- 已提交的 URL:
- https://oast.live/
- 報告完成時間:
連結 · 找到 1 個
從頁面中識別的傳出連結
連結 | Text |
---|---|
https://github.com/projectdiscovery/interactsh | Interactsh |
JavaScript 變數 · 找到 3 個
在頁面的視窗物件上載入的全域 JavaScript 變數是在函數外部宣告的變數,可從目前範圍內程式碼中的任何位置存取
名稱 | 類型 |
---|---|
onbeforetoggle | object |
documentPictureInPicture | object |
onscrollend | object |
主控台記錄訊息 · 找到 0 條
記錄到 Web 主控台的訊息
HTML
頁面的原始 HTML 主體
<html><head></head><body><h1> Interactsh Server </h1>
<a href="https://github.com/projectdiscovery/interactsh"><b>Interactsh</b></a> is an open-source tool for detecting out-of-band interactions. It is a tool designed to detect vulnerabilities that cause external interactions.<br><br>
If you notice any interactions from <b>*.oast.live</b> in your logs, it's possible that someone (internal security engineers, pen-testers, bug-bounty hunters) has been testing your application.<br><br>
You should investigate the sites where these interactions were generated from, and if a vulnerability exists, examine the root cause and take the necessary steps to mitigate the issue.
</body></html>