HTB range series Windows target and Arctic target
The 30 second response speed set by this target is really desperate. Seriously, you can play with your mobile phone for half a day every time you do an action
prospecting
nmap
nmap -sS -p 1-65535 10.10.10.11
Starting Nmap 7.91 ( https://nmap.org ) at 2022-01-03 15:31 CST
Nmap scan report for 10.10.10.11
Host is up (0.28s latency).
Not s ...
Posted by pgrevents on Sun, 30 Jan 2022 06:10:34 +0100
Same journey SRC Patrol - intranet vulnerability emergency cruise scanning system
Analysis of patrol source code -- detailed understanding and use
Patrol is a quick emergency and cruise scanning system for vulnerabilities in the enterprise intranet.
View the internal network asset distribution, specify the vulnerability plug-in, quickly detect the vulnerability of the search results, and output the result report
Portal ...
Posted by JeanieTallis on Sat, 29 Jan 2022 11:58:38 +0100
[SUCTF 2019]EasyWeb --- no parameter RCE
SUCTF 2019]EasyWeb
Test site:
No alphanumeric shellUse htaccess upload fileBypass open_basedir Source code audit
<?php
function get_the_flag(){
// web admin will remove your upload file every 20 min!!!!
$userdir = "upload/tmp_".md5($_SERVER['REMOTE_ADDR']); //Naming format (upload/tmp_md5(ip))
if(!file_exists($userdir)){ ...
Posted by chintupintu03 on Sat, 29 Jan 2022 01:15:05 +0100
Sqlmap basic usage
SQLmap
usage
Usage: python sqlmap.py [option]
Options:
-h, --help Display basic help information and exit
-hh Show advanced help and exit
--version Display program version information and exit
-v VERBOSE Output information detail level: 0-6((default = 1)
Objectives:
Provide a ...
Posted by ukspudnie on Fri, 28 Jan 2022 21:15:20 +0100
OpenSSL3.0 learning II encryption library algorithm acquisition CSDN creation punch in
๐ Blog home page: Actor's blog ๐ Welcome to pay attention ๐ give the thumbs-up ๐ Collection โญ Leave a message ๐ โค๏ธ Look forward to communicating together! ๐ The author's level is very limited. If you find an error, please let me know. Thank you! ๐บ If you have any questions, you can communicate by private letter!!!
๐ฅฆ Algorithm a ...
Posted by spiritssight on Thu, 27 Jan 2022 12:41:57 +0100
How to prevent the risk caused by the root of the mobile phone?
Problem scenario
The new mobile phone is too expensive. Users want to buy it, but they suffer from limited funds. They go to the second-hand market and find that the price is much cheaper than the positive price in the market. They buy it immediately. Unexpectedly, the mobile phone has been used by the root. What can we do? Buying a mobile pho ...
Posted by The Midnighter on Thu, 27 Jan 2022 01:59:38 +0100
WEB Security: CSRF
Solemnly declare: This note is only prepared for the purpose of improving safety knowledge and sharing safety knowledge with more people. Do not use the technology in the note for illegal activities. The consequences caused by using the technology in the note have nothing to do with the author himself. It is everyone's responsibility to maintai ...
Posted by stickynote427 on Thu, 27 Jan 2022 01:20:21 +0100
Revisit Oath2 Configuration of 0
preparation
Firstly, the UserDetailsService interface needs to be implemented to complete the loading of users; Note that the password here needs to be encrypted. If the database is plaintext, it needs to be encrypted and set later
Furthermore, a UserDetails interface needs to be implemented to complete the external output of user informa ...
Posted by edawg on Tue, 25 Jan 2022 12:13:41 +0100
[PHP] common functions for file upload
preface
Collected several common functions in file upload and utilization. An in-depth understanding of these functions should contribute to the smooth upload and utilization of files.
Indexes
1. deldot
2. in_array
3. intval
4. strrchr
5. strtolower
6. strrpos
7. str_ireplace
8. strstr
9. substr
10. trim
Common functions
1. deld ...
Posted by jd023 on Tue, 25 Jan 2022 11:18:02 +0100
shiro and Spring Boot integration (learning notes)
What is Shiro
Official website: http://shiro.apache.org/
It is a mainstream Java security framework that does not rely on any container and can run in Java SE and Java EE Projects. Its main function is to authenticate, authorize, session management, encryption and other operations for users accessing the system.
Shiro is a systematic framewo ...
Posted by cypher235 on Mon, 24 Jan 2022 22:41:11 +0100