Small ideas of session utilization
Small ideas of session utilization
preface
When doing questions, we often take into account the use of session. There are two common basic types: session file inclusion and session deserialization. We haven't summarized it in detail before, so let's write it.
session file contains
php.ini
session related configuration
session.upload_progr ...
Posted by bliljerk101 on Fri, 07 Jan 2022 13:45:14 +0100
4W words + thousands of lines of code! Tomcat penetration test method summary, bring it to you!
catalogue
preface
install
Tomcat analysis
Main documents
Upload directory
Tomcat penetration
Tomcat arbitrary file write (CVE-2017-12615)
Tomcat remote code execution (CVE-2019-0232)
Tomcat weak password & background getshell vulnerability
Tomcat manager App brute force cracking
Tomcat AJP file contains vulnerability analysis (CV ...
Posted by live_ex3me on Mon, 03 Jan 2022 11:34:46 +0100
[quick start Nessus - beginner level]
What is Nessus?
This is a vulnerability scanning system based on C/S architecture
What is vulnerability scanning?
Vulnerability scanning is a technical means to find the vulnerabilities of the target system, and further use the discovered vulnerabilities to do something they have always wanted to do but couldn't do before, such as penetratio ...
Posted by voitek on Mon, 03 Jan 2022 03:08:52 +0100
How to prevent sql injection and parameter passing in mybatis
environment
mysql is used. The database name is test and contains 1. The table name is users. The data in users is as follows
SQL injection under JDBC
There are two methods to execute SQL statements under JDBC, namely Statement and PrepareStatement, in which PrepareStatement is precompiled
Statement
SQL statement
SELECT * FROM users W ...
Posted by dropfaith on Sun, 02 Jan 2022 23:24:57 +0100
Basic knowledge suitable for beginners - SSTI vulnerability learning
Introduction to SSTI
MVC MVC is a framework mode. Its full name is Model View Controller.
That is, model - View - controller Under the guidance of MVC, in the development, a method of separating business logic, data and interface display is used to organize the code, gather the business logic into one component, and get better development a ...
Posted by Jurik on Sun, 02 Jan 2022 15:02:35 +0100
[HTB] Tabby (tomcat, curl, user group authorization: lxd)
DisclaimersThe host penetrated by this article is legally authorized. The tools and methods used in this article are limited to learning and communication. Please do not use the tools and ideas used in this article for any illegal purpose. I will not bear any responsibility for all the consequences, nor will I be responsible for any misuse or d ...
Posted by Joe on Sat, 01 Jan 2022 22:50:23 +0100
Metasploit+Beef integration attack - super detailed
preface
Beef is the most popular web framework attack platform in Europe and America. kali integrates beef, and beef has many easy payload s. For example, through the simple vulnerability of XSS, beef can control the browser of the target host through a prepared javascript, get various information through the browser and scan intranet in ...
Posted by robshanks on Sat, 01 Jan 2022 17:58:48 +0100
[HTB] Irked (software backdoor, picture steganography, custom SUID command hijacking)
DisclaimersThe host penetrated by this article is legally authorized. The tools and methods used in this article are limited to learning and communication. Please do not use the tools and infiltration ideas used in this article for any illegal purpose. I will not bear any responsibility for all the consequences, nor be responsible for any misus ...
Posted by divedj on Wed, 22 Dec 2021 23:08:24 +0100
Intranet attack and defense - power lifting - Linux
Linux rights one text link
preface
The original text comes from https://www.freebuf.com/articles/251884.html I feel that many of them are machine turned, and there are some format problems, large and small So I went to the Internet to find the original text, translated and typeset it again, and also referred to the translation of the origin ...
Posted by iblackedout on Tue, 21 Dec 2021 08:36:14 +0100
ATT&CK combat series - red team assessment WP
Environment construction
Target download address http://vulnstack.qiyuanxuetang.net/vuln/detail/5/
After downloading the virtual machine, configure the network environment according to the official instructions to start the test
Infiltration process
0x01 WEB information collection
Check the target WEB service and find that it is a de ...
Posted by mgilbert on Mon, 20 Dec 2021 16:42:31 +0100