[intranet learning notes] 23. Use of SMBExec and DCOM

1,SMBExec With SMBExec, commands can be executed in remote systems through file sharing (admin $, c $, ipc $, d $), and its working mode is similar to PsExec C + + version C + + project address: https://github.com/sunorr/smbexec This project was uploaded 8 years ago, and then tried to use VS2019, but it failed to compile successfully. At pr ...

Posted by ozfred on Thu, 16 Dec 2021 13:44:42 +0100

Advanced Automated Deployment of windows Service+OpenSSH+SVN on Jenkins

1. IntroductionI've written two articles about introducing automated deployment using Jenkins, regardless of whether the enterprise is using it now. Net Framework or. Net Core, whether the enterprise is using git or SVN. In fact, these two articles are usually enough to deliver 80% of the business in the development phase. The disadvantage is t ...

Posted by Jove on Thu, 09 Dec 2021 19:55:57 +0100

The core principle of reverse engineering -- message hooking

HOOK The English word Hook, translated into Chinese, means "Hook" and "fish Hook", which generally refers to all tools used to catch what you need. The basic meaning of "Hook" extends to "the means or tools used to peek or intercept information". Here are some examples to further illustrate the concept o ...

Posted by dhope on Tue, 07 Dec 2021 23:21:05 +0100

DVWA Level 6: Insecure CAPTCHA (Insecure Authentication Code)

Catalog Low  Medium  High Impossible Insecure CAPTCHA, which means unsafe authentication code, is short for Completely Automated Public Turing Test to Tell Computers and Humans Apart, a Turing test that automatically distinguishes computers from humans. However, I think it would be better to call the content of this module an unsafe verif ...

Posted by coollog on Tue, 07 Dec 2021 19:15:47 +0100

A series of operations triggered by "@ Value injection failed" in "SpringBoot source code"

background In the project, I want to inject a field with @ Value, but I didn't expect that the injection was unsuccessful, but I can do it in another way, so I want to know the reason why the @ Value annotation was unsuccessful. The code in this article is based on Spring version 5.3.8 Simulate @ Value successful scenario First of all, in o ...

Posted by Shroder on Tue, 02 Nov 2021 13:57:24 +0100

[Web security] php://filter Shallow bottom layer analysis

Create a new PHP file: a.php <?php $a = "a.txt"; include("php://filter/resource=" . $a); Create a new file in the same directory: a.txt (the content is <? PHP phpinfo();? > base64 encoding) PD9waHAgcGhwaW5mbygpOz8+ Next breakpoint in the related function of the corresponding file: [data] Post key codes: php_stream * php_strea ...

Posted by homer.favenir on Tue, 02 Nov 2021 06:58:08 +0100

Briefly explain how to bypass PHP disable_function

preface In the penetration test, sometimes the command cannot be executed after getting the webshell. In order to successfully raise the right, we need to bypass disable_function disable_ Introduction to function disable_ Functions is a setting option in php.ini. It can be used to set the PHP environment to prohibit the use of some fu ...

Posted by chrima on Mon, 01 Nov 2021 09:30:01 +0100

Some learning and Thinking on Web shell exemption -- Taking PHP as an example

preface When using webshell, killing free is something to consider. To put it bluntly, my webshell has to be usable! Therefore, this article does a webshell free learning, which is mainly a sentence of php 1, About webshell The so-called web shell is to send a file written by malicious code (i.e. shell) to the server. The client connects ...

Posted by sholtzrevtek on Sun, 24 Oct 2021 05:10:31 +0200

DVWA platform vulnerability testing and source code analysis SQL injection

DVWA platform is an effective way for beginners of network security to understand the ten vulnerabilities. This platform collects the ten most common vulnerabilities threatening network security, and provides a shooting range experimental environment for beginners. We can use this platform to carry out various attack experiments, so as to enric ...

Posted by cheatboy00 on Sat, 09 Oct 2021 05:59:32 +0200

HCIE first day operation

1. Summary of the day Low end equipment often solves multi-function, and medium and high-end equipment has special functions The upper connection is mainly optical fiber, and the lower connection is photoelectric The essence of down connection is to increase the port density and long distance The higher up, the better the performance of the eq ...

Posted by leewad on Fri, 24 Sep 2021 17:42:13 +0200