Buffer Overflow Attack Lab (Set-UID Version)
Buffer Overflow Attack Lab (Set-UID Version)
Lab link: https://seedsecuritylabs.org/Labs_20.04/Software/Buffer_Overflow_Setuid/
Experimental environment: ubuntu20 04
The aim of the attack is to obtain the uid permission of the attack buffer file by using the attack buffer permission of the over set
Experimental documents: Labsetup.zip
Expe ...
Posted by Xorandnotor on Sun, 16 Jan 2022 09:54:55 +0100
SHA1 algorithm details
SHA1 algorithm details
SHA1 algorithm, as a digest algorithm, is used in various signature, digest and other scenarios. In this chapter, we analyze the details of SHA1 algorithm in detail;
Definition of terms
word: 32bit String, which can be expressed as 8 hexadecimal sequences, such as A103FE23; integer: number between 0-2 ^ 32-1; B ...
Posted by neo0506 on Sat, 15 Jan 2022 14:12:24 +0100
The strongest hacker library Blackbone tutorial
Environment construction
Project address
https://github.com/DarthTon/Blackbone
Project introduction
As Windows developers, they often encounter operations of enumerating processes, enumerating modules, reading and writing process memory; Windows security developers will involve injection, hook, operating PE files and writing drivers. We ...
Posted by cac_azure03 on Fri, 14 Jan 2022 13:13:11 +0100
WEB vulnerability - knowledge points
preface
Explain the types of vulnerabilities on various WEB levels, the hazard level of specific vulnerabilities, and a brief impact range test for example analysis. The vulnerabilities in the mind map are also various knowledge points we will learn. In fact, according to the formation principle of vulnerabilities, how to find and use them ...
Posted by joshuaceo on Fri, 14 Jan 2022 06:34:19 +0100
DDoS attack methods
DDoS attack methods
Most of the content of this paper draws lessons from the in-depth analysis of DDoS attack and prevention of the king of destruction. Interested students can read this book, which is very helpful to me as an introductory book.
DDoS (Distributed Denial of Service), the first denial of service attack, dates back to 1996. Why ...
Posted by seanrock on Thu, 13 Jan 2022 16:14:28 +0100
Getting started with basics - packet expansion
HTTP&HTTPS
HTTP: HTTP->TCPHTTPS: http - > SSL / TLS (encryption / decryption) - > TCP
1.HTTP
HyperText Transfer Protocol is an application layer protocol for distributed, cooperative and hypermedia information systems. Simply put, it is a method of publishing and receiving HTML pages, which is used to transfer information betwee ...
Posted by delxy on Thu, 13 Jan 2022 15:36:33 +0100
CTF pwn direction partial problem solution
dataleak
Two \ x00 can be skipped with "\ or / but each time" \ is used, 4 bytes will be copied to buf, so the last 3 bytes of data cannot be leaked. Therefore, / \ is used to control the leaked string with garbage data filling.
exp:
#!python
#coding:utf-8
from pwn import *
import subprocess, sys, os
from time import sleep
sa = l ...
Posted by jasongr on Wed, 12 Jan 2022 12:09:40 +0100
PHP uses asymmetric encryption algorithm (RSA)
Type of encryption:
In daily design and development, in order to ensure the security of data transmission and data storage, data plaintext can be encrypted into complex ciphertext through specific algorithms. At present, the mainstream encryption methods can be roughly divided into one-way encryption and two-way encryption.
Unidirection ...
Posted by nwoottonn on Tue, 11 Jan 2022 12:42:48 +0100
WEB security file contains vulnerability ---------
File contains vulnerability
Vulnerability description
When the server contains arbitrary files through PHP features (functions), because the source of the file to be included is not filtered strictly, it can contain a malicious file, and we can use the included file to construct malicious code for attack.
Causes of vulnerabilities
...
Posted by Jackomo0815 on Tue, 11 Jan 2022 10:58:10 +0100
Can hardware breakpoints still play like this?
In the previous article, we introduced inline hook (hook method for modifying code). Next, we are going to introduce hardware breakpoint + veh hook (hook method without modifying code). As the groundwork, this paper first introduces the hardware breakpoint.
After obtaining the actual combat code and reference materials of this article, please ...
Posted by Studio381 on Mon, 10 Jan 2022 16:16:24 +0100