"Java security" deserialization - CC2 deserialization vulnerability POP chain analysis_ ysoserial CommonsCollections2 PoC analysis

preface java selects 8u111 for reproduction According to ysoserial prompt, CC4 is required 0 version <!-- https://mvnrepository.com/artifact/org.apache.commons/commons-collections4 --> <dependency> <groupId>org.apache.commons</groupId> <artifactId>commons-collections4</artifactId> <vers ...

Posted by danville on Thu, 10 Mar 2022 14:48:55 +0100

Operating system experiment -- process scheduling

Implementation of process scheduling algorithm Summary: The process scheduling algorithm is realized, including FCFS (first in first out), SPF (short process priority), HRRF (highest response ratio priority method) and HPF (priority method). A process management simulation system that allows n processes to run concurrently is designed. The syst ...

Posted by kennethl on Mon, 07 Mar 2022 05:54:46 +0100

[JAVA deserialization beginner] DNSLOG deserialization chain analysis

1. Application of dnslog chain 2. Use idea and ysoserial for debugging 3. Analyze the payload of ysosecial Application of DNSLOG chain Dnslog chain can only be used to prove the entry of deserialization and judge whether the target can go out of the network. Dnslog is used to judge the existence of deserialization vulnerability and whether th ...

Posted by snoopgreen on Sat, 05 Mar 2022 05:07:00 +0100

Security Learning of FPM and FTP

preface Here is a brief summary of some attacks on FPM and FastCGI Pre knowledge What is CGI? Early Web servers could only respond to the request for HTTP static resources sent by the browser and return the static resources stored in the server to the browser. With the development of Web technology, dynamic technology gradually appea ...

Posted by ColinP on Sun, 27 Feb 2022 11:40:25 +0100

SQL injection bypass technology for web Security

In this paper, the bypass technology of SQL injection for web security is explained in detail, and the principle and application method of SQL injection bypass technology are more deeply mastered through the content in this paper, so as to be better used in penetration testing; The contents of the article are all compiled by personal understand ...

Posted by newbiehacker on Sat, 26 Feb 2022 13:14:26 +0100

The [CTFshow] file contains web78-web81

web78 if(isset($_GET['file'])){ $file = $_GET['file']; include($file); }else{ highlight_file(__FILE__); } See the include function in the source code. This means that the php file is imported from the outside and executed. If the execution is unsuccessful, the source code of the file is returned.The get parameter of the file ...

Posted by pineapple1 on Fri, 25 Feb 2022 15:16:21 +0100

DVWA learning notes

Security Level: LOW Brute Force Source code analysis: <?php if( isset( $_GET[ 'Login' ] ) ) { // Get username $user = $_GET[ 'username' ]; // Get password $pass = $_GET[ 'password' ]; $pass = md5( $pass ); // Check the database $query = "SELECT * FROM `users` WHERE user = '$user' AND password = '$pass';"; ...

Posted by brucemalti on Fri, 25 Feb 2022 02:00:17 +0100

Arbitrary Code Execution Vulnerability

catalogue 1, What is an arbitrary code execution vulnerability 2, Harm of vulnerability 3, Arbitrary Code Execution Vulnerability 1. Exploit of eval() function Exploit function (1 EVAL)_ one 1.2 exploit of eval() function_ two 1.3. Exploit of eval() function_ three 1.4preg_replace+/e utilization 2.assert() function 3.preg_replace(); ...

Posted by wpsd2006 on Wed, 23 Feb 2022 13:13:44 +0100

SQL injection -- blind injection based on time

Purpose of this chapter Popularize the application scenarios and conditions of delayed blind injection technology, be familiar with the usage of functions such as length(), Substr(), ascii(), sleep(), if(), and master the basic process of time-based blind injection. PS: the interview questions and answers are delayed without deep questions E ...

Posted by jokkis on Sun, 20 Feb 2022 14:50:47 +0100

hgame web week1 week2 wp ththaiai

web week1 Fujiwara Tofu Shop See qiumingshan Net to try Referer directly Hachi roku guessed What raspberry cookie is a bit of a pit father Cookies are cookies, but direct setting is wrong. There is no key value. If you see a set cookie in response, just use that key; The same is true for gasoline. Finally, payload is as follows: Spider.. ...

Posted by tycragg on Sun, 20 Feb 2022 12:23:01 +0100