Buffer Overflow Attack Lab (Set-UID Version)

Buffer Overflow Attack Lab (Set-UID Version) Lab link: https://seedsecuritylabs.org/Labs_20.04/Software/Buffer_Overflow_Setuid/ Experimental environment: ubuntu20 04 The aim of the attack is to obtain the uid permission of the attack buffer file by using the attack buffer permission of the over set Experimental documents: Labsetup.zip Expe ...

Posted by Xorandnotor on Sun, 16 Jan 2022 09:54:55 +0100

SHA1 algorithm details

SHA1 algorithm details SHA1 algorithm, as a digest algorithm, is used in various signature, digest and other scenarios. In this chapter, we analyze the details of SHA1 algorithm in detail; Definition of terms word: 32bit String, which can be expressed as 8 hexadecimal sequences, such as A103FE23; integer: number between 0-2 ^ 32-1; B ...

Posted by neo0506 on Sat, 15 Jan 2022 14:12:24 +0100

The strongest hacker library Blackbone tutorial

Environment construction Project address https://github.com/DarthTon/Blackbone Project introduction As Windows developers, they often encounter operations of enumerating processes, enumerating modules, reading and writing process memory; Windows security developers will involve injection, hook, operating PE files and writing drivers. We ...

Posted by cac_azure03 on Fri, 14 Jan 2022 13:13:11 +0100

WEB vulnerability - knowledge points

preface Explain the types of vulnerabilities on various WEB levels, the hazard level of specific vulnerabilities, and a brief impact range test for example analysis. The vulnerabilities in the mind map are also various knowledge points we will learn. In fact, according to the formation principle of vulnerabilities, how to find and use them ...

Posted by joshuaceo on Fri, 14 Jan 2022 06:34:19 +0100

DDoS attack methods

DDoS attack methods Most of the content of this paper draws lessons from the in-depth analysis of DDoS attack and prevention of the king of destruction. Interested students can read this book, which is very helpful to me as an introductory book. DDoS (Distributed Denial of Service), the first denial of service attack, dates back to 1996. Why ...

Posted by seanrock on Thu, 13 Jan 2022 16:14:28 +0100

Getting started with basics - packet expansion

HTTP&HTTPS HTTP: HTTP->TCPHTTPS: http - > SSL / TLS (encryption / decryption) - > TCP 1.HTTP HyperText Transfer Protocol is an application layer protocol for distributed, cooperative and hypermedia information systems. Simply put, it is a method of publishing and receiving HTML pages, which is used to transfer information betwee ...

Posted by delxy on Thu, 13 Jan 2022 15:36:33 +0100

CTF pwn direction partial problem solution

dataleak Two \ x00 can be skipped with "\ or / but each time" \ is used, 4 bytes will be copied to buf, so the last 3 bytes of data cannot be leaked. Therefore, / \ is used to control the leaked string with garbage data filling. exp: #!python #coding:utf-8 from pwn import * import subprocess, sys, os from time import sleep sa = l ...

Posted by jasongr on Wed, 12 Jan 2022 12:09:40 +0100

PHP uses asymmetric encryption algorithm (RSA)

Type of encryption: In daily design and development, in order to ensure the security of data transmission and data storage, data plaintext can be encrypted into complex ciphertext through specific algorithms. At present, the mainstream encryption methods can be roughly divided into one-way encryption and two-way encryption. Unidirection ...

Posted by nwoottonn on Tue, 11 Jan 2022 12:42:48 +0100

WEB security file contains vulnerability ---------

File contains vulnerability Vulnerability description When the server contains arbitrary files through PHP features (functions), because the source of the file to be included is not filtered strictly, it can contain a malicious file, and we can use the included file to construct malicious code for attack. Causes of vulnerabilities ...

Posted by Jackomo0815 on Tue, 11 Jan 2022 10:58:10 +0100

Can hardware breakpoints still play like this?

In the previous article, we introduced inline hook (hook method for modifying code). Next, we are going to introduce hardware breakpoint + veh hook (hook method without modifying code). As the groundwork, this paper first introduces the hardware breakpoint.   After obtaining the actual combat code and reference materials of this article, please ...

Posted by Studio381 on Mon, 10 Jan 2022 16:16:24 +0100