Command injection summary
Command injection summary
Command injection is to execute arbitrary commands on the host operating system through vulnerable applications. In this attack, the operating system commands provided by the attacker are usually executed with the privileges of the vulnerable application. Command injection attacks are likely to be mainly due to in ...
Posted by xenooreo on Wed, 15 Dec 2021 07:33:32 +0100
Log4j2 Vulnerability Replication
Preface
Log4j2's remote execution vulnerability has recently become so hot that I've been using logback s to save lives and lie in bed to watch the show this weekend. We don't need to, but we still need to know.
Reproduction
Control server
■ RMIServer
RMIServer starts an rmi service, which starts two ports, a registry setting, and a ra ...
Posted by JamesThePanda on Tue, 14 Dec 2021 18:49:19 +0100
An article to understand linux users and user groups
introduce
linux is a multi-user system, which arranges corresponding permissions for each user, so as to better manage files. For example, a user assigns a class of files, so that this class of files can only allow specific users to carry out sensitive operations, so as to prevent other files from being affected and the system from running ...
Posted by jandante@telenet.be on Sun, 12 Dec 2021 21:04:59 +0100
Zuul service gateway ✧
Zuul service gateway ☣
Summary of prerequisite knowledge points (not part of the text)
1, What is a gateway?
API Gateway (APIGW / API Gateway) , as its name implies, is an API oriented, serial and centralized strong control service that appears on the system boundary. The boundary here is the boundary of the enterpris ...
Posted by www.phphub.com on Sat, 11 Dec 2021 14:26:42 +0100
[vulnerability] log4j2 remote code execution and actual code reproduction
Vulnerability principle
1. The attack disguises a request body containing JNDI executable services. Here I mainly try LDAP and RMI. The request URL is as follows:
LADP: ${jndi:ldap://127.0.0.1:1389/hello}RMI: ${jndi:ldap://127.0.0.1:1389/hello}
2. When the application happens to output the request header or input parameter log, it will ...
Posted by dominod on Sat, 11 Dec 2021 10:13:56 +0100
DVWA level 8: SQL Injection (Blind)
catalogue
Low
Medium
High
Impossible
SQL Injection (blind), that is, SQL blind injection, is different from general injection in that the general injection attacker can directly see the execution result of the injection statement from the page, while during blind injection, the attacker usually cannot obtain the execution result from the ...
Posted by dmcke5 on Wed, 08 Dec 2021 21:11:46 +0100
Byte jump safety Ai challenge - Summary of small sample track scheme
1 description of competition questions
In real social networks, cheating users will affect the social network platform. In the real scene, there will be many constraints. We can only obtain a small number of cheating samples and a part of normal user samples. Now we need to use a small number of labeled samples to mine the remaining cheating s ...
Posted by NikkiLoveGod on Wed, 08 Dec 2021 02:44:27 +0100
Note the primary Sql injection combined with secondary injection and error reporting injection
preface:
The article was first published in https://sleepymonster.cn
This is a question for the finals of the 2021 Jinan University freshman competition.
At that time, I was gambling. If I did it, I would win the second prize
Unfortunately, the network is not powerful enough to suck out second times without changing the script.
But I'v ...
Posted by Craig_H on Tue, 07 Dec 2021 23:52:20 +0100
DVWA Level 6: Insecure CAPTCHA (Insecure Authentication Code)
Catalog
Low
Medium
High
Impossible
Insecure CAPTCHA, which means unsafe authentication code, is short for Completely Automated Public Turing Test to Tell Computers and Humans Apart, a Turing test that automatically distinguishes computers from humans. However, I think it would be better to call the content of this module an unsafe verif ...
Posted by coollog on Tue, 07 Dec 2021 19:15:47 +0100
Ganwangbei 2021 CTF---Misc&WebWriteup
preface
How to evaluate the 2021 dai Lian cup?, My evaluation is "immortals fight, mortals suffer".
Misc
Misc1-decodemaster
After getting the title, open the word file and find that it is a string of random codes with the font of Wingdings 2 Modify the font and find that the font can be displayed normally when it is in bold ( ...
Posted by 9902468 on Tue, 07 Dec 2021 10:46:33 +0100