Struts vulnerability collection

Struts vulnerability collection Some Strtus2 vulnerabilities are summarized. Although there are few vulnerabilities in this part, it is also a part of learning. The collection is not comprehensive, and will be supplemented later. The vulnerability environment can be built using the online vulfucus or deployed using docker S2-001 (CVE-2007-45 ...

Posted by TylerL on Mon, 24 Jan 2022 19:31:46 +0100

ThinkPHP6.0 deserialization vulnerability

ThinkPHP6.0 deserialization vulnerability preface In learning the master's thinkphp6 Recurrence of deserialization vulnerability in 0. X article I found that the TP version I downloaded was the repaired version. So change the old chain to reach RCE. Before reading this article, let's take a look at the above-mentioned master's article. Repai ...

Posted by Vebut on Fri, 21 Jan 2022 20:32:40 +0100

SpringSecurity4 learning notes

Structure forming 1. SpringSecurity 2. Introductory cases Create a new SpringBoot project and add Security and Web dependencies Create a new login and home page in resources – static Start the project and visit localhost:8080/login to see the login page that appears (this page is generated by Security by default) When the pr ...

Posted by dough boy on Fri, 21 Jan 2022 18:29:55 +0100

Yunxin classroom | how to realize audio and video security detection?

The pan entertainment audio and video chat scene is full of uncontrollable risk factors, such as pornography, violent fear and political information. With the increasingly strict national supervision, each platform needs to control the audio and video content of the platform, and it needs to invest a lot of manpower to process the audio and vid ...

Posted by deregular on Fri, 21 Jan 2022 14:40:18 +0100

Key review of computer network

computer network one.Computer Network Overview Concept of computer network:(*) 1.**Definition of computer network**: 2.**Composition of computer network:** 3.Type of computer network: Computer network architecture 1.Transmission mode: 2.Data exc ...

Posted by steven fullman on Thu, 20 Jan 2022 11:18:30 +0100

Collection of struts 2 vulnerability recurrence

1. Introduction to struts 2 Struts 2 is a Web application framework based on MVC design pattern. It is essentially equivalent to a servlet. In MVC design pattern, struts 2 acts as a controller to establish the data interaction between model and view. Struts 2 is the next generation product of struts. It is a new struts 2 framework based on the ...

Posted by djroki on Wed, 19 Jan 2022 12:15:08 +0100

Logical vulnerability (unauthorized access and payment vulnerability)

This column is the author's network security learning notes, which are shared and used as notes at the same time Previous link Construction of Wamp / DVWA / sqli LabsUse of burpsuite tool to capture packets and Intruder brute force crackingUse of directory scanning, request retransmission, vulnerability scanning and other toolsWebsite infor ...

Posted by davidmuir on Wed, 19 Jan 2022 02:40:13 +0100

Spring Security Series (12) - four authorization modes of Oauth2 open platform authorization service

to configure 1. Add WebSecurityConfigurerAdapter configuration A password parser is added, a user is added in memory, and other configurations will be added later. @Configuration @EnableWebSecurity(debug = true) @EnableGlobalMethodSecurity(prePostEnabled = true, securedEnabled = true, jsr250Enabled = true) public class MyWebSecurityConfigura ...

Posted by Haroskyline on Tue, 18 Jan 2022 02:12:57 +0100

File upload vulnerability - upload Labs

File upload - upload Labs 1. Introduction to file upload vulnerability When uploading files, the server does not strictly filter the files uploaded by the client, causing the attacker to upload any type of files, including various script files (php,asp,aspx,jsp, etc.), causing the attacker to control the server. During the attack, the uploaded ...

Posted by cl_stef on Mon, 17 Jan 2022 00:32:54 +0100

Design of Web security module based on Token

preface Recently, I was working on a Web project. At first, I used Spring boot + Spring security, and then found that Spring security was too bloated (maybe I haven't used it yet). Just now, a WeChat official account tweeted me into the Token authentication mode. After understanding it, I thought it was very useful, so I began to change it ...

Posted by Phoenixheart on Sun, 16 Jan 2022 17:35:02 +0100