CTF [network security laboratory] [basic level]
Basic pass
1. Where is the key?
F12 view source code
2. Encrypt again and you will get the key
The encrypted data is xrlvf23xfqwsxsqf
We can encrypt it once.
ROT13 online decoding tool
3. Guess how many times it has been encrypted?
Encrypted string:
Vm0wd2QyUXlVWGxWV0d4V1YwZDRWMVl3WkRSV01WbDNXa1JTVjAxV2JETlhhMUpUVmpBeFYyS
kVUbGhoTVVw ...
Posted by madcrazy1 on Sat, 19 Feb 2022 14:46:26 +0100
ctfshow php feature web89-web115 web123-150wp
php features
Reference blogs are still Nanshen blog
web89
include("flag.php");
highlight_file(__FILE__);
if(isset($_GET['num'])){
$num = $_GET['num'];
if(preg_match("/[0-9]/", $num)){
die("no no no!");
}
if(intval($num)){
echo $flag;
}
}
Here is an intval function: get the integer value of the variab ...
Posted by Garcia on Thu, 03 Feb 2022 16:02:35 +0100
ctfshow code audit web301-web310 wp
There may be a lot of nonsense. It mainly records the process of finding loopholes from so many files
Reference blog
https://blog.csdn.net/rfrder/article/details/113924013 https://blog.csdn.net/miuzzx/article/details/111352849 https://rainy-autumn.top/archives/913
web301
Audit the loopholes written by the group leader three years ago
se ...
Posted by greekhand on Thu, 03 Feb 2022 07:00:52 +0100
The ctfshow command executes web29-web77 web118-122 web124 wp
Nanshen blog
Command execution
web29
preg_match : Match regular expression
After pattern separator"i"Tag this is a case insensitive search
In mode\b Mark a word boundary, so only independent words will be matched, such as:
if (preg_match("/\bweb\b/i", "PHP is the web scripting language of choice.")) : True
if (preg_matc ...
Posted by rodin on Wed, 02 Feb 2022 22:16:41 +0100
ATT&CK actual combat series - red team actual combat
Environment construction
Download address: http://vulnstack.qiyuanxuetang.net/vuln/detail/2/
Official description
The red team actual combat series mainly takes the real enterprise environment as an example to build a series of shooting ranges and learn through the trinity of practice, video tutorial and blog. In addition, the actual com ...
Posted by Opticon on Mon, 31 Jan 2022 21:14:40 +0100
Record once from blind SSRF to RCE
Gongzong No.: black palm A blogger who focuses on sharing network security, hot spots in the hacker circle and hacker tool technology area!
I. Preface
The vulnerability bounty program for discovering this vulnerability does not allow public disclosure, so I will not directly use the system name involved. The project is one of the projects t ...
Posted by monkey72 on Fri, 21 Jan 2022 13:55:43 +0100
The engineers next door cried greedily for my reverse engineering IDA and said they would rub my back and pinch my feet
primary coverage
According to the monitoring requirements of process behavior, many security software used Hook technology to intercept key system calls to intercept malware process creation. However, under x64 architecture, the system kernel has done a lot of security detection measures, especially technologies like KDP, which makes th ...
Posted by StewardManscat on Thu, 20 Jan 2022 07:20:46 +0100
[IDS road] the latest Snort3 and Snort2 installation detailed tutorial
Welcome new students ... ... If you are nameless, you can concentrate on practicing sword
I am not a salted fish, but a dead fish!
I have seen many installation tutorials of snort3 and snort2 on the Internet, especially the installation of snort3. Bloggers seriously doubt whether they have really installed successfully, People really w ...
Posted by t0ta11 on Wed, 19 Jan 2022 07:08:04 +0100
Research on dandelion for directly downloading third-party IPA application distribution platform
At present, dandelion and fir are commonly used platforms based on third-party application distribution. After we submit them to the platform, we can download them by scanning the application QR code. For example, the dandelion platform is as follows:
So the above is a very common operation process. The problem is: how to download the IPA in ...
Posted by prasadharischandra on Wed, 19 Jan 2022 02:44:33 +0100
dried food! Summary of common methods of Intranet penetration
Gongzong No.: Black palm A blogger who focuses on sharing penetration testing, hot spots in the hacker circle and hacker tool technology area!
preface
During intranet penetration, a WebShell or CobaltStrike, Metasploit, etc. are just the beginning. It is more about moving horizontally within the intranet, expanding the results and reaching ...
Posted by Crashin on Sat, 15 Jan 2022 23:04:25 +0100