{"id":770,"date":"2023-06-20T16:23:17","date_gmt":"2023-06-20T08:23:17","guid":{"rendered":"https:\/\/cms.aaasec.com.tw\/?p=770"},"modified":"2023-06-20T16:23:17","modified_gmt":"2023-06-20T08:23:17","slug":"n-stalker-web-application-security-scanner-x","status":"publish","type":"post","link":"https:\/\/cms.aaasec.com.tw\/index.php\/2023\/06\/20\/n-stalker-web-application-security-scanner-x\/","title":{"rendered":"N-Stalker Web Application Security Scanner X"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"1024\" src=\"https:\/\/cms.aaasec.com.tw\/wp-content\/uploads\/2023\/06\/1120619-N-stalker_\u5de5\u4f5c\u5340\u57df-1-3-1024x1024.png\" alt=\"\" class=\"wp-image-774\" srcset=\"https:\/\/cms.aaasec.com.tw\/wp-content\/uploads\/2023\/06\/1120619-N-stalker_\u5de5\u4f5c\u5340\u57df-1-3-1024x1024.png 1024w, https:\/\/cms.aaasec.com.tw\/wp-content\/uploads\/2023\/06\/1120619-N-stalker_\u5de5\u4f5c\u5340\u57df-1-3-300x300.png 300w, https:\/\/cms.aaasec.com.tw\/wp-content\/uploads\/2023\/06\/1120619-N-stalker_\u5de5\u4f5c\u5340\u57df-1-3-150x150.png 150w, https:\/\/cms.aaasec.com.tw\/wp-content\/uploads\/2023\/06\/1120619-N-stalker_\u5de5\u4f5c\u5340\u57df-1-3-768x768.png 768w, https:\/\/cms.aaasec.com.tw\/wp-content\/uploads\/2023\/06\/1120619-N-stalker_\u5de5\u4f5c\u5340\u57df-1-3-1536x1536.png 1536w, https:\/\/cms.aaasec.com.tw\/wp-content\/uploads\/2023\/06\/1120619-N-stalker_\u5de5\u4f5c\u5340\u57df-1-3-2048x2048.png 2048w, https:\/\/cms.aaasec.com.tw\/wp-content\/uploads\/2023\/06\/1120619-N-stalker_\u5de5\u4f5c\u5340\u57df-1-3-250x250.png 250w, https:\/\/cms.aaasec.com.tw\/wp-content\/uploads\/2023\/06\/1120619-N-stalker_\u5de5\u4f5c\u5340\u57df-1-3-1040x1040.png 1040w, https:\/\/cms.aaasec.com.tw\/wp-content\/uploads\/2023\/06\/1120619-N-stalker_\u5de5\u4f5c\u5340\u57df-1-3-640x640.png 640w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>By Mike<\/p>\n\n\n\n<p>\u5148\u524d\u6211\u5011\u4ecb\u7d39\u300cOWASP Zed Attack Proxy\u300d\u7db2\u9801\u6383\u63cf\u5de5\u5177\uff0c\u5728\u6587\u7ae0\u88e1\u6211\u5011\u63d0\u5230\u6aa2\u6e2c\u5de5\u5177\u6797\u6797\u7e3d\u7e3d\uff0c\u5e02\u9762\u4e0a\u6709\u5f88\u591a\u5de5\u5177\u53ef\u4ee5\u9078\u64c7\u3002\u90a3\u9664\u4e86OWASP ZAP\u4ee5\u5916\uff0c\u9084\u6709\u54ea\u4e9b\u5de5\u5177\u53ef\u4ee5\u4f7f\u7528\u5462\uff1f\u5404\u4f4d\u5ba2\u5b98\u6709\u798f\u4e86\uff0c\u4eca\u5929\u5c0f\u7de8\u518d\u8ddf\u5927\u5bb6\u4ecb\u7d39\u53e6\u4e00\u5957\u7db2\u9801\u6383\u63cf\u5de5\u5177\u300cN-Stalker Web Application Security Scanner X\u300d(\u4ee5\u4e0b\u7c21\u7a31 N-Stalker X)\u3002<\/p>\n\n\n\n<p>N-Stalker X\u5f9e\u540d\u5b57\u4e0a\u4f86\u770b\uff0c\u5927\u6982\u53ef\u4ee5\u731c\u51fa\u5b83\u7684\u958b\u767c\u5546\u3002\u6c92\u932f\uff0c\u5c31\u662fN-Stalker\u3002\u9019\u5957\u8edf\u9ad4\u662f\u7528\u65bc\u8a55\u4f30\u7db2\u9801\u7684\u5b89\u5168\u6027\uff0c\u5176\u7d50\u5408\u4e86HTTP\u6383\u63cf\u5668N-Stealth\u8207\u5305\u542b39,000\u500b\u7db2\u9801\u653b\u64ca\u7279\u5fb5\u7684\u8cc7\u6599\u5eab\uff0c\u4ee5\u53caWeb\u61c9\u7528\u7a0b\u5f0f\u7684\u5b89\u5168\u6027\u8a55\u4f30\u6280\u8853<a>\u3002<\/a>\u53ef\u70ba\u958b\u767c\u8005\u3001\u6aa2\u6e2c\u4eba\u54e1\u3001IT\u4eba\u54e1\u9032\u884c\u8a31\u591a\u4e0d\u540c\u7684\u6aa2\u6e2c\u9805\u76ee\u3002\u4f60\u53ef\u80fd\u6703\u597d\u5947\u5230\u5e95\u6709\u54ea\u4e9b\u6aa2\u6e2c\u5167\u5bb9\uff1fN-Stalker\u7684\u6aa2\u6e2c\u9805\u76ee\u9075\u7167\u4e86\u8a31\u591a\u570b\u969b\u6a19\u6e96\uff0c\u5982OWASP Top10\u3001PCI\u53caSANS Top10\/20\u3002\u6aa2\u6e2c\u5167\u5bb9\u5247\u5305\u542b\u4e0d\u540c\u9762\u5411\uff0c\u5982\u7a0b\u5f0f\u78bc\u64b0\u5beb\u932f\u8aa4\u6240\u884d\u751f\u7684\u6f0f\u6d1e\u3001\u4f3a\u670d\u5668\u7684\u654f\u611f\u8cc7\u8a0a\u5916\u6d29\u3001\u5099\u4efd\u6216\u8a2d\u5b9a\u6a94\u5916\u6d29\u7b49\u3002<\/p>\n\n\n\n<p>\u5f9e\u524d\u9762\u7684\u8aaa\u660e\u6211\u5011\u53ef\u4ee5\u77e5\u9053\uff0cN-Stalker X\u80fd\u5354\u52a9\u57f7\u884c\u7db2\u9801\u5b89\u5168\u6027\u8a55\u4f30\uff0c\u90a3\u4ec0\u9ebc\u6642\u5019\u53ef\u4ee5\u7528\u5230\u5462\uff1fN-Stalker\u63d0\u51fa\u4e86\u5728\u7cfb\u7d71\u767c\u5c55\u751f\u547d\u9031\u671f(System Development Life Cycle, SDLC)\u4e2d\u52a0\u5165N-Stalker X\u4ee5\u78ba\u4fdd\u7db2\u9801\u7684\u5b89\u5168\u6027\uff0c\u5728\u8a2d\u8a08\u8207\u958b\u767c\u968e\u6bb5\u8a55\u4f30\u57f7\u884c\u74b0\u5883\uff0c\u540c\u6642\u6aa2\u67e5\u7a0b\u5f0f\u78bc\u4e2d\u7684\u6f0f\u6d1e\uff1b\u800c\u5728\u6e2c\u8a66\u8207\u4f48\u7f72\u968e\u6bb5\uff0c\u5247\u900f\u904e\u5de5\u5177\u8f14\u52a9\u9032\u884c\u6ef2\u900f\u6e2c\u8a66\uff0c\u4ee5\u9a57\u8b49\u5176\u5b89\u5168\u6027\uff1b\u6700\u5f8c\u65bc\u7dad\u8b77\u6aa2\u67e5\u968e\u6bb5\uff0c\u5247\u6301\u7e8c\u4e26\u5b9a\u671f\u57f7\u884c\u5b89\u5168\u6027\u8a55\u4f30\uff0c\u4ee5\u7ba1\u7406\u7db2\u7ad9\u7684\u6f0f\u6d1e\u8207\u98a8\u96aa\u3002<\/p>\n\n\n\n<p>\u800c\u65e2\u7136N-Stalker X\u548c\u4e4b\u524d\u4ecb\u7d39\u7684OWASP ZAP\u90fd\u662f\u7db2\u9801\u5b89\u5168\u6027\u6aa2\u6e2c\u5de5\u5177\uff0c\u90a3\u4f60\u53ef\u80fd\u6703\u60f3\u5230\u5e95\u54ea\u4e00\u5957\u5de5\u5177\u6bd4\u8f03\u597d\uff0c\u61c9\u8a72\u8981\u9078\u64c7\u54ea\u4e00\u500b\uff1f\u5957\u4e00\u53e5\u516c\u9053\u8a71\u300c\u5c0f\u5b69\u5b50\u624d\u505a\u9078\u64c7\u300d\uff0c\u6bcf\u4e00\u7a2e\u90fd\u8a66\u8a66\u770b\u5c31\u77e5\u9053\u54ea\u4e00\u7a2e\u5de5\u5177\u6bd4\u8f03\u9069\u5408\u4f60\u56c9\uff01<\/p>\n\n\n\n<ul><li><a href=\"https:\/\/www.convisoappsec.com\/platform\">N-Stalker Product<\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><a id=\"_msocom_1\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Mike \u5148\u524d\u6211\u5011\u4ecb\u7d39\u300cOWASP&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/posts\/770"}],"collection":[{"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/comments?post=770"}],"version-history":[{"count":9,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/posts\/770\/revisions"}],"predecessor-version":[{"id":783,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/posts\/770\/revisions\/783"}],"wp:attachment":[{"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/media?parent=770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/categories?post=770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/tags?post=770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}