ekucms2.5 local file contains vulnerability - code audit
ekucms2.5 local file contains vulnerability - code audit
1, Foreword
In order to learn the operation principle of Thinkphp framework and strengthen its own code audit ability, we specially looked for a CMS vulnerability article written by php on the Internet for reproduction and reverse code audit. Vulnerability reference articles are as foll ...
Posted by backie on Wed, 16 Feb 2022 17:44:52 +0100
[loophole recurrence] Tomcat CVE-2017-12615 (arbitrary file upload vulnerability)
preface
This article is only for security research and skill learning. It should not be used for unauthorized penetration attacks. Any consequences have nothing to do with the author of this article.
1, Vulnerability description
However, the vulnerable Tomcat runs on the Windows/Linux host, and the HTTP PUT request method is enabl ...
Posted by drdapoo on Wed, 16 Feb 2022 08:29:08 +0100
scapy dual thread, blocking, monitoring, contracting, shaking hands, sending http requests
Involving knowledge
1. The essence of handshake and wave
In fact, I think waving and shaking hands are completely confusing concepts. The change of serial number and verification number completely depends on whether you are the data sender or receiver.
The data here only refers to the data carried in the application layer http, excludin ...
Posted by bluedogatdingdong on Fri, 11 Feb 2022 22:57:41 +0100
Dark moon penetration actual shooting range - item 8
Dark moon penetration actual shooting range - item 8
Environment construction
Network card design
What needs to be prepared are three network cards, the NAT mode network card provided by the virtual machine, and two self added 19 and 18 network cards in host mode only
Topological graph
Specific topologies of the two practical projects
...
Posted by yaatra on Fri, 11 Feb 2022 21:10:45 +0100
PHP session file inclusion and deserialization (utilization of session.upload_progress)
preface
This article uses PHP_SESSION_UPLOAD_PROGRESS summarizes file inclusion and deserialization.
That is, the file inclusion and deserialization of PHP session
Introduction to session
Session is called "session control". The session object stores the attributes and configuration information required for a specific user ...
Posted by CiPH on Fri, 11 Feb 2022 18:37:03 +0100
JWT security issues
JWT overview
Json Web Token (JWT) is a JSON based open standard implemented to transfer declarations between network application environments. The declaration of JWT is generally used to transfer the authenticated user identity information between identity providers and service providers, so as to obtain resources from the resource serv ...
Posted by jestaji on Thu, 10 Feb 2022 12:58:59 +0100
Zero to zero prototype chain pollution (JavaScript)
preface
I've met many test questions of prototype chain knowledge points, and I've been hammered every time. I don't want to think about it next time...
JavaScript prototype
Classes in javascript use classes in java and php to define classes, but methods defined by functions.
JavaScript is often described as a prototype based language - each ob ...
Posted by cooldude832 on Sat, 05 Feb 2022 19:11:52 +0100
Section 21 principle and experiment of ACL (access control list) - filter the data packets on the interface according to the set conditions
1 ACL overview
(1) Definition: Access Control List access control list is actually a packet filtering technology. Access Control List (ACL) is an access control technology based on packet filtering. It can filter the data packets on the interface according to the set conditions and allow them to pass or discard. (2) Function:
1) Access co ...
Posted by Xoom3r on Sat, 05 Feb 2022 05:51:04 +0100
Attack and defense world page 3 8 points
filemanager
Inspection point: secondary injection + code audit capability
Old rule – > scan directly The existing directory is found to be Find a www.tar GZ file Combined with the upload function in the web page The idea of guessing this question may be to use the leaked file to audit the code and upload it successfully Get getshell ...
Posted by helz on Fri, 04 Feb 2022 13:21:15 +0100
ctfshow code audit web301-web310 wp
There may be a lot of nonsense. It mainly records the process of finding loopholes from so many files
Reference blog
https://blog.csdn.net/rfrder/article/details/113924013 https://blog.csdn.net/miuzzx/article/details/111352849 https://rainy-autumn.top/archives/913
web301
Audit the loopholes written by the group leader three years ago
se ...
Posted by greekhand on Thu, 03 Feb 2022 07:00:52 +0100