Ten thousand word summary of XSS's strongest knowledge system vulnerabilities

I XSSI vulnerability principle Homology strategy Homology policy is the most basic and core policy in Web application security model. Now all browsers that support JavaScript will use this strategy. The so-called homology means that the domain name, protocol and port are the same. The same origin policy stipulates that client scripts (ja ...

Posted by 2gd-2be-2rue on Mon, 17 Jan 2022 16:37:30 +0100

WEB vulnerability - knowledge points

preface Explain the types of vulnerabilities on various WEB levels, the hazard level of specific vulnerabilities, and a brief impact range test for example analysis. The vulnerabilities in the mind map are also various knowledge points we will learn. In fact, according to the formation principle of vulnerabilities, how to find and use them ...

Posted by joshuaceo on Fri, 14 Jan 2022 06:34:19 +0100

CTF pwn direction partial problem solution

dataleak Two \ x00 can be skipped with "\ or / but each time" \ is used, 4 bytes will be copied to buf, so the last 3 bytes of data cannot be leaked. Therefore, / \ is used to control the leaked string with garbage data filling. exp: #!python #coding:utf-8 from pwn import * import subprocess, sys, os from time import sleep sa = l ...

Posted by jasongr on Wed, 12 Jan 2022 12:09:40 +0100

Nucleus -- a fast vulnerability scanning tool based on YAML syntax template

1, Tool introduction 1. Introduction Nucleus is a customized rapid vulnerability scanner based on YAML syntax template. It is developed with Go language and has strong configurability, scalability and ease of use. At present, the project has 6.6k stars on Github. Official website: https://nuclei.projectdiscovery.ioNucleoi project addres ...

Posted by leeperryar on Sun, 09 Jan 2022 10:31:51 +0100

Small ideas of session utilization

Small ideas of session utilization preface When doing questions, we often take into account the use of session. There are two common basic types: session file inclusion and session deserialization. We haven't summarized it in detail before, so let's write it. session file contains php.ini session related configuration session.upload_progr ...

Posted by bliljerk101 on Fri, 07 Jan 2022 13:45:14 +0100

2 - vulnerability analysis - tomcat AJP protocol file contains vulnerability analysis [CVE-2020-1938]

Vulnerability Description: tomcat is a small and medium-sized Java EE server developed by Apache organization. It implements Java EE specifications such as servlet and JSP, and can provide web resource access services. tomcat mainly provides two communication modes to access web resources: http protocol and AJP protocol. The tomcat server wil ...

Posted by genom on Mon, 03 Jan 2022 09:47:55 +0100

How to prevent sql injection and parameter passing in mybatis

environment mysql is used. The database name is test and contains 1. The table name is users. The data in users is as follows SQL injection under JDBC There are two methods to execute SQL statements under JDBC, namely Statement and PrepareStatement, in which PrepareStatement is precompiled Statement SQL statement SELECT * FROM users W ...

Posted by dropfaith on Sun, 02 Jan 2022 23:24:57 +0100

(cve-2021-45046) log4j2 DOS rce mode reproduction

On December 9, I saw an article on research ideas related to log4j2 DOS vulnerabilities. Unfortunately, I was busy and didn't have time to do it See, most of the log4j2 versions have been upgraded to 2.17 these days. I have squeezed some time to reproduce it Statement: for vulnerability understanding and learning and security reinforcement solu ...

Posted by kidd1270 on Fri, 24 Dec 2021 00:29:51 +0100

DVWA SQL Injection(blind) full level

SQL Injection(blind) 1. Low Manual injection method The server will only return and not display the search value. This kind of SQL injection without echo is called SQL blind injection. This question will only return whether the user exists or not, that is, true or false. This kind of blind note becomes Boolean blind note. The injection ...

Posted by acook on Thu, 23 Dec 2021 16:57:41 +0100

clamav+pyClamad linux virus scanning

1, Background Clam AntiVirus(Clam AV) is a free and open source anti-virus software. Software and virus library updates are released free of charge by the open source community. At present, ClamdAV mainly provides virus scanning and killing for Linux and Uinux systems. pyClamad is a third-party module of python, which allows Python to directly ...

Posted by friday_13 on Mon, 20 Dec 2021 09:03:42 +0100