[Tryhackme]Enterprise(Unquoted Service Paths)
Service detectionPort detectionroot@ip-10-10-208-107:~# nmap -p- 10.10.59.205 --open
Starting Nmap 7.60 ( https://nmap.org ) at 2022-03-04 02:48 GMT
Nmap scan report for ip-10-10-248-133.eu-west-1.compute.internal (10.10.59.205)
Host is up (0.0039s latency).
Not shown: 61918 closed ports, 3588 filtered ports
Some closed ports may be reported a ...
Posted by nemesis1931 on Sat, 05 Mar 2022 04:51:10 +0100
Penetration test exercise No.45 HackMyVm Worrosion3
Target information
Download address:
https://hackmyvm.eu/machines/machine.php?vm=Corrosion3
Range: hackmyvm eu
Target name: Worrosion3
Difficulty: simple
Release time: February 18, 2022
Prompt:
nothing
Target: 2 flag s
Experimental environment
Attack aircraft:VMware kali 192.168.7.3
Target plane:Vbox linux IP Automatic acquisit ...
Posted by Fluoresce on Tue, 01 Mar 2022 13:43:05 +0100
SQL injection bypass technology for web Security
In this paper, the bypass technology of SQL injection for web security is explained in detail, and the principle and application method of SQL injection bypass technology are more deeply mastered through the content in this paper, so as to be better used in penetration testing; The contents of the article are all compiled by personal understand ...
Posted by newbiehacker on Sat, 26 Feb 2022 13:14:26 +0100
Shooting range weight raising collection
It's said that linux raised the right, but when sorting out, you involuntarily wrote the contents of windows, which turned into a hodgepodge. You don't know whether it's good or bad
https://github.com/sagishahar/lpeworkshop
Windows Rights:
FuzzySecurity | Windows Privilege Escalation Fundamentals
https://github.com/netbiosX/Checklis ...
Posted by themaxx113 on Wed, 09 Feb 2022 02:05:45 +0100
Use Metasploit to generate attack payload - msfvenom free killing and upx shelling
preface
This paper introduces in detail how to use Metasploit to create attack payload (using attack payload generator msfvenom), and how to avoid killing and shell the attack payload, so as to break through the anti-virus software
1, Avoid killing
No killing literally means to avoid being killed. To be precise, when the created atta ...
Posted by jaydeesmalls on Wed, 02 Feb 2022 17:46:14 +0100
HTB range series Windows target and Arctic target
The 30 second response speed set by this target is really desperate. Seriously, you can play with your mobile phone for half a day every time you do an action
prospecting
nmap
nmap -sS -p 1-65535 10.10.10.11
Starting Nmap 7.91 ( https://nmap.org ) at 2022-01-03 15:31 CST
Nmap scan report for 10.10.10.11
Host is up (0.28s latency).
Not s ...
Posted by pgrevents on Sun, 30 Jan 2022 06:10:34 +0100
Same journey SRC Patrol - intranet vulnerability emergency cruise scanning system
Analysis of patrol source code -- detailed understanding and use
Patrol is a quick emergency and cruise scanning system for vulnerabilities in the enterprise intranet.
View the internal network asset distribution, specify the vulnerability plug-in, quickly detect the vulnerability of the search results, and output the result report
Portal ...
Posted by JeanieTallis on Sat, 29 Jan 2022 11:58:38 +0100
[PHP] common functions for file upload
preface
Collected several common functions in file upload and utilization. An in-depth understanding of these functions should contribute to the smooth upload and utilization of files.
Indexes
1. deldot
2. in_array
3. intval
4. strrchr
5. strtolower
6. strrpos
7. str_ireplace
8. strstr
9. substr
10. trim
Common functions
1. deld ...
Posted by jd023 on Tue, 25 Jan 2022 11:18:02 +0100
Struts vulnerability collection
Struts vulnerability collection
Some Strtus2 vulnerabilities are summarized. Although there are few vulnerabilities in this part, it is also a part of learning. The collection is not comprehensive, and will be supplemented later.
The vulnerability environment can be built using the online vulfucus or deployed using docker
S2-001 (CVE-2007-45 ...
Posted by TylerL on Mon, 24 Jan 2022 19:31:46 +0100
Record once from blind SSRF to RCE
Gongzong No.: black palm A blogger who focuses on sharing network security, hot spots in the hacker circle and hacker tool technology area!
I. Preface
The vulnerability bounty program for discovering this vulnerability does not allow public disclosure, so I will not directly use the system name involved. The project is one of the projects t ...
Posted by monkey72 on Fri, 21 Jan 2022 13:55:43 +0100