Ten thousand word summary of XSS's strongest knowledge system vulnerabilities
I XSSI vulnerability principle
Homology strategy
Homology policy is the most basic and core policy in Web application security model.
Now all browsers that support JavaScript will use this strategy.
The so-called homology means that the domain name, protocol and port are the same.
The same origin policy stipulates that client scripts (ja ...
Posted by 2gd-2be-2rue on Mon, 17 Jan 2022 16:37:30 +0100
WEB vulnerability - knowledge points
preface
Explain the types of vulnerabilities on various WEB levels, the hazard level of specific vulnerabilities, and a brief impact range test for example analysis. The vulnerabilities in the mind map are also various knowledge points we will learn. In fact, according to the formation principle of vulnerabilities, how to find and use them ...
Posted by joshuaceo on Fri, 14 Jan 2022 06:34:19 +0100
CTF pwn direction partial problem solution
dataleak
Two \ x00 can be skipped with "\ or / but each time" \ is used, 4 bytes will be copied to buf, so the last 3 bytes of data cannot be leaked. Therefore, / \ is used to control the leaked string with garbage data filling.
exp:
#!python
#coding:utf-8
from pwn import *
import subprocess, sys, os
from time import sleep
sa = l ...
Posted by jasongr on Wed, 12 Jan 2022 12:09:40 +0100
Nucleus -- a fast vulnerability scanning tool based on YAML syntax template
1, Tool introduction
1. Introduction
Nucleus is a customized rapid vulnerability scanner based on YAML syntax template. It is developed with Go language and has strong configurability, scalability and ease of use.
At present, the project has 6.6k stars on Github.
Official website: https://nuclei.projectdiscovery.ioNucleoi project addres ...
Posted by leeperryar on Sun, 09 Jan 2022 10:31:51 +0100
Small ideas of session utilization
Small ideas of session utilization
preface
When doing questions, we often take into account the use of session. There are two common basic types: session file inclusion and session deserialization. We haven't summarized it in detail before, so let's write it.
session file contains
php.ini
session related configuration
session.upload_progr ...
Posted by bliljerk101 on Fri, 07 Jan 2022 13:45:14 +0100
2 - vulnerability analysis - tomcat AJP protocol file contains vulnerability analysis [CVE-2020-1938]
Vulnerability Description:
tomcat is a small and medium-sized Java EE server developed by Apache organization. It implements Java EE specifications such as servlet and JSP, and can provide web resource access services. tomcat mainly provides two communication modes to access web resources: http protocol and AJP protocol.
The tomcat server wil ...
Posted by genom on Mon, 03 Jan 2022 09:47:55 +0100
How to prevent sql injection and parameter passing in mybatis
environment
mysql is used. The database name is test and contains 1. The table name is users. The data in users is as follows
SQL injection under JDBC
There are two methods to execute SQL statements under JDBC, namely Statement and PrepareStatement, in which PrepareStatement is precompiled
Statement
SQL statement
SELECT * FROM users W ...
Posted by dropfaith on Sun, 02 Jan 2022 23:24:57 +0100
(cve-2021-45046) log4j2 DOS rce mode reproduction
On December 9, I saw an article on research ideas related to log4j2 DOS vulnerabilities. Unfortunately, I was busy and didn't have time to do it See, most of the log4j2 versions have been upgraded to 2.17 these days. I have squeezed some time to reproduce it Statement: for vulnerability understanding and learning and security reinforcement solu ...
Posted by kidd1270 on Fri, 24 Dec 2021 00:29:51 +0100
DVWA SQL Injection(blind) full level
SQL Injection(blind)
1. Low
Manual injection method
The server will only return and not display the search value. This kind of SQL injection without echo is called SQL blind injection.
This question will only return whether the user exists or not, that is, true or false. This kind of blind note becomes Boolean blind note.
The injection ...
Posted by acook on Thu, 23 Dec 2021 16:57:41 +0100
clamav+pyClamad linux virus scanning
1, Background
Clam AntiVirus(Clam AV) is a free and open source anti-virus software. Software and virus library updates are released free of charge by the open source community. At present, ClamdAV mainly provides virus scanning and killing for Linux and Uinux systems. pyClamad is a third-party module of python, which allows Python to directly ...
Posted by friday_13 on Mon, 20 Dec 2021 09:03:42 +0100