dried food! Summary of common methods of Intranet penetration

Gongzong No.: Black palm A blogger who focuses on sharing penetration testing, hot spots in the hacker circle and hacker tool technology area! preface During intranet penetration, a WebShell or CobaltStrike, Metasploit, etc. are just the beginning. It is more about moving horizontally within the intranet, expanding the results and reaching ...

Posted by Crashin on Sat, 15 Jan 2022 23:04:25 +0100

Web security of Advanced Encryption Standard (AES) and Security Assertion Markup Language (SAML)

Having a more secure channel is the best way to transmit user information across the network Download source code - 1.1 MB cryptography Most of the problems on the network are related to security issues and the storage and transmission of sensitive data in the network. So we must provide a secure system on it. The most popular and practical w ...

Posted by wpfn on Sat, 15 Jan 2022 00:09:29 +0100

Burpsuit2021 series environment configuration and crack installation

preface The video version of this article is available at station B: https://www.bilibili.com/video/BV1aq4y1X7oE?p=2 Burp Suite is an integrated penetration testing tool, which integrates a variety of penetration testing components, enabling us to better complete penetration testing and attacks on web applications automatically or manually. I ...

Posted by SueHubert on Fri, 14 Jan 2022 03:20:25 +0100

Reverse experiment on sign signature of API interface at H5 end of flying pig

Disclaimers The technology mentioned in this article is only for learning purposes. It is prohibited to use any technology in this article to launch network attacks, illegal utilization and other network crimes, and all information is prohibited to be used for any illegal purpose. If the reader uses the technology mentioned in the article to co ...

Posted by rejoice on Wed, 12 Jan 2022 21:47:13 +0100

Network protection notes -- XSS vulnerability exploitation

Browser homology policy summary In 1995, the same origin policy was introduced by Netscape. At present, all browsers implement this policy. Initially, it means that the Cookie set by page A and page B cannot be opened unless the two pages are "homologous". The so-called "homology" refers to "three sameness":   ( ...

Posted by RyanMinor on Wed, 12 Jan 2022 19:20:57 +0100

CTF pwn direction partial problem solution

dataleak Two \ x00 can be skipped with "\ or / but each time" \ is used, 4 bytes will be copied to buf, so the last 3 bytes of data cannot be leaked. Therefore, / \ is used to control the leaked string with garbage data filling. exp: #!python #coding:utf-8 from pwn import * import subprocess, sys, os from time import sleep sa = l ...

Posted by jasongr on Wed, 12 Jan 2022 12:09:40 +0100

[file upload bypass] - parsing vulnerability htaccess file parsing vulnerability

1, Purpose of the experiment: 1. Understand what is htaccess file. 2. Through the upload labs game (Pass-04), master htaccess file parsing vulnerability technology. 2, Tools: cmd command line Firefox / Google browser 3, Experimental environment: Target machine: windows10 virtual machine: 192.168.100.150    & ...

Posted by prasitc2005 on Mon, 10 Jan 2022 23:58:22 +0100

Bloofox CMS code audit

Project address https://github.com/alexlang24/bloofoxCMS bloofoxCMS is a free open source web content management system (CMS) written in PHP using MySQL. Rough sweep Use seay to go through it More than 200 suspected vulnerabilities reflect the shortcomings of the traditional regular expression matching based code audit: rigid rules and many ...

Posted by bedted on Mon, 10 Jan 2022 07:02:12 +0100

Nucleus -- a fast vulnerability scanning tool based on YAML syntax template

1, Tool introduction 1. Introduction Nucleus is a customized rapid vulnerability scanner based on YAML syntax template. It is developed with Go language and has strong configurability, scalability and ease of use. At present, the project has 6.6k stars on Github. Official website: https://nuclei.projectdiscovery.ioNucleoi project addres ...

Posted by leeperryar on Sun, 09 Jan 2022 10:31:51 +0100

Small ideas of session utilization

Small ideas of session utilization preface When doing questions, we often take into account the use of session. There are two common basic types: session file inclusion and session deserialization. We haven't summarized it in detail before, so let's write it. session file contains php.ini session related configuration session.upload_progr ...

Posted by bliljerk101 on Fri, 07 Jan 2022 13:45:14 +0100