HTB range series Windows target and Arctic target

The 30 second response speed set by this target is really desperate. Seriously, you can play with your mobile phone for half a day every time you do an action prospecting nmap nmap -sS -p 1-65535 10.10.10.11 Starting Nmap 7.91 ( https://nmap.org ) at 2022-01-03 15:31 CST Nmap scan report for 10.10.10.11 Host is up (0.28s latency). Not s ...

Posted by pgrevents on Sun, 30 Jan 2022 06:10:34 +0100

Same journey SRC Patrol - intranet vulnerability emergency cruise scanning system

Analysis of patrol source code -- detailed understanding and use Patrol is a quick emergency and cruise scanning system for vulnerabilities in the enterprise intranet. View the internal network asset distribution, specify the vulnerability plug-in, quickly detect the vulnerability of the search results, and output the result report Portal ...

Posted by JeanieTallis on Sat, 29 Jan 2022 11:58:38 +0100

[SUCTF 2019]EasyWeb --- no parameter RCE

SUCTF 2019]EasyWeb Test site: No alphanumeric shellUse htaccess upload fileBypass open_basedir Source code audit <?php function get_the_flag(){ // web admin will remove your upload file every 20 min!!!! $userdir = "upload/tmp_".md5($_SERVER['REMOTE_ADDR']); //Naming format (upload/tmp_md5(ip)) if(!file_exists($userdir)){ ...

Posted by chintupintu03 on Sat, 29 Jan 2022 01:15:05 +0100

Sqlmap basic usage

SQLmap usage Usage: python sqlmap.py [option] Options: -h, --help Display basic help information and exit -hh Show advanced help and exit --version Display program version information and exit -v VERBOSE Output information detail level: 0-6((default = 1) Objectives: Provide a ...

Posted by ukspudnie on Fri, 28 Jan 2022 21:15:20 +0100

OpenSSL3.0 learning II encryption library algorithm acquisition CSDN creation punch in

๐Ÿ“’ Blog home page: Actor's blog ๐ŸŽ‰ Welcome to pay attention ๐Ÿ”Ž give the thumbs-up ๐Ÿ‘ Collection โญ Leave a message ๐Ÿ“ โค๏ธ Look forward to communicating together! ๐Ÿ™ The author's level is very limited. If you find an error, please let me know. Thank you! ๐ŸŒบ If you have any questions, you can communicate by private letter!!! ๐Ÿฅฆ Algorithm a ...

Posted by spiritssight on Thu, 27 Jan 2022 12:41:57 +0100

How to prevent the risk caused by the root of the mobile phone?

Problem scenario The new mobile phone is too expensive. Users want to buy it, but they suffer from limited funds. They go to the second-hand market and find that the price is much cheaper than the positive price in the market. They buy it immediately. Unexpectedly, the mobile phone has been used by the root. What can we do? Buying a mobile pho ...

Posted by The Midnighter on Thu, 27 Jan 2022 01:59:38 +0100

WEB Security: CSRF

Solemnly declare: This note is only prepared for the purpose of improving safety knowledge and sharing safety knowledge with more people. Do not use the technology in the note for illegal activities. The consequences caused by using the technology in the note have nothing to do with the author himself. It is everyone's responsibility to maintai ...

Posted by stickynote427 on Thu, 27 Jan 2022 01:20:21 +0100

Revisit Oath2 Configuration of 0

preparation Firstly, the UserDetailsService interface needs to be implemented to complete the loading of users; Note that the password here needs to be encrypted. If the database is plaintext, it needs to be encrypted and set later Furthermore, a UserDetails interface needs to be implemented to complete the external output of user informa ...

Posted by edawg on Tue, 25 Jan 2022 12:13:41 +0100

[PHP] common functions for file upload

preface Collected several common functions in file upload and utilization. An in-depth understanding of these functions should contribute to the smooth upload and utilization of files. Indexes 1. deldot 2. in_array 3. intval 4. strrchr 5. strtolower 6. strrpos 7. str_ireplace 8. strstr 9. substr 10. trim Common functions 1. deld ...

Posted by jd023 on Tue, 25 Jan 2022 11:18:02 +0100

shiro and Spring Boot integration (learning notes)

What is Shiro Official website: http://shiro.apache.org/ It is a mainstream Java security framework that does not rely on any container and can run in Java SE and Java EE Projects. Its main function is to authenticate, authorize, session management, encryption and other operations for users accessing the system. Shiro is a systematic framewo ...

Posted by cypher235 on Mon, 24 Jan 2022 22:41:11 +0100