ekucms2.5 local file contains vulnerability - code audit

ekucms2.5 local file contains vulnerability - code audit 1, Foreword In order to learn the operation principle of Thinkphp framework and strengthen its own code audit ability, we specially looked for a CMS vulnerability article written by php on the Internet for reproduction and reverse code audit. Vulnerability reference articles are as foll ...

Posted by backie on Wed, 16 Feb 2022 17:44:52 +0100

[loophole recurrence] Tomcat CVE-2017-12615 (arbitrary file upload vulnerability)

preface This article is only for security research and skill learning. It should not be used for unauthorized penetration attacks. Any consequences have nothing to do with the author of this article. 1, Vulnerability description However, the vulnerable Tomcat runs on the Windows/Linux host, and the HTTP PUT request method is enabl ...

Posted by drdapoo on Wed, 16 Feb 2022 08:29:08 +0100

scapy dual thread, blocking, monitoring, contracting, shaking hands, sending http requests

Involving knowledge 1. The essence of handshake and wave In fact, I think waving and shaking hands are completely confusing concepts. The change of serial number and verification number completely depends on whether you are the data sender or receiver. The data here only refers to the data carried in the application layer http, excludin ...

Posted by bluedogatdingdong on Fri, 11 Feb 2022 22:57:41 +0100

Dark moon penetration actual shooting range - item 8

Dark moon penetration actual shooting range - item 8 Environment construction Network card design What needs to be prepared are three network cards, the NAT mode network card provided by the virtual machine, and two self added 19 and 18 network cards in host mode only Topological graph Specific topologies of the two practical projects ...

Posted by yaatra on Fri, 11 Feb 2022 21:10:45 +0100

PHP session file inclusion and deserialization (utilization of session.upload_progress)

preface This article uses PHP_SESSION_UPLOAD_PROGRESS summarizes file inclusion and deserialization. That is, the file inclusion and deserialization of PHP session Introduction to session Session is called "session control". The session object stores the attributes and configuration information required for a specific user ...

Posted by CiPH on Fri, 11 Feb 2022 18:37:03 +0100

JWT security issues

JWT overview Json Web Token (JWT) is a JSON based open standard implemented to transfer declarations between network application environments. The declaration of JWT is generally used to transfer the authenticated user identity information between identity providers and service providers, so as to obtain resources from the resource serv ...

Posted by jestaji on Thu, 10 Feb 2022 12:58:59 +0100

Zero to zero prototype chain pollution (JavaScript)

preface I've met many test questions of prototype chain knowledge points, and I've been hammered every time. I don't want to think about it next time... JavaScript prototype Classes in javascript use classes in java and php to define classes, but methods defined by functions. JavaScript is often described as a prototype based language - each ob ...

Posted by cooldude832 on Sat, 05 Feb 2022 19:11:52 +0100

Section 21 principle and experiment of ACL (access control list) - filter the data packets on the interface according to the set conditions

1 ACL overview (1) Definition: Access Control List access control list is actually a packet filtering technology. Access Control List (ACL) is an access control technology based on packet filtering. It can filter the data packets on the interface according to the set conditions and allow them to pass or discard. (2) Function: 1) Access co ...

Posted by Xoom3r on Sat, 05 Feb 2022 05:51:04 +0100

Attack and defense world page 3 8 points

filemanager Inspection point: secondary injection + code audit capability Old rule – > scan directly The existing directory is found to be Find a www.tar GZ file Combined with the upload function in the web page The idea of guessing this question may be to use the leaked file to audit the code and upload it successfully Get getshell ...

Posted by helz on Fri, 04 Feb 2022 13:21:15 +0100

ctfshow code audit web301-web310 wp

There may be a lot of nonsense. It mainly records the process of finding loopholes from so many files Reference blog https://blog.csdn.net/rfrder/article/details/113924013 https://blog.csdn.net/miuzzx/article/details/111352849 https://rainy-autumn.top/archives/913 web301 Audit the loopholes written by the group leader three years ago se ...

Posted by greekhand on Thu, 03 Feb 2022 07:00:52 +0100