[attack and defense world CTF | WP] ics-07

subject thinking View interface Open the title and we can see a website that can be operated only through the project management interface. The project management interface is as follows We see a source code link. The source code of the link is as follows <?php session_start(); if (!isset($_GET[page])) { show_sour ...

Posted by pauleth on Tue, 01 Feb 2022 17:34:58 +0100

Notes on "Introduction to machine learning in Web security": Chapter 7 7.3 naive Bayesian detection WebShell

1. Source code modification (1) Error reporting UnicodeDecodeError: 'gbk' codec can't decode byte 0x9a in position 8: illegal multibyte sequence   Load ../data/PHP-WEBSHELL/xiaoma/1148d726e3bdec6db65db30c08a75f80.php Traceback (most recent call last): ...... t=load_file(file_path) for line in f: UnicodeDecodeError: 'gbk' codec can't deco ...

Posted by Fritz on Mon, 31 Jan 2022 08:39:01 +0100

HTB range series Windows target and Arctic target

The 30 second response speed set by this target is really desperate. Seriously, you can play with your mobile phone for half a day every time you do an action prospecting nmap nmap -sS -p 1-65535 10.10.10.11 Starting Nmap 7.91 ( https://nmap.org ) at 2022-01-03 15:31 CST Nmap scan report for 10.10.10.11 Host is up (0.28s latency). Not s ...

Posted by pgrevents on Sun, 30 Jan 2022 06:10:34 +0100

Same journey SRC Patrol - intranet vulnerability emergency cruise scanning system

Analysis of patrol source code -- detailed understanding and use Patrol is a quick emergency and cruise scanning system for vulnerabilities in the enterprise intranet. View the internal network asset distribution, specify the vulnerability plug-in, quickly detect the vulnerability of the search results, and output the result report Portal ...

Posted by JeanieTallis on Sat, 29 Jan 2022 11:58:38 +0100

[SUCTF 2019]EasyWeb --- no parameter RCE

SUCTF 2019]EasyWeb Test site: No alphanumeric shellUse htaccess upload fileBypass open_basedir Source code audit <?php function get_the_flag(){ // web admin will remove your upload file every 20 min!!!! $userdir = "upload/tmp_".md5($_SERVER['REMOTE_ADDR']); //Naming format (upload/tmp_md5(ip)) if(!file_exists($userdir)){ ...

Posted by chintupintu03 on Sat, 29 Jan 2022 01:15:05 +0100

HTB range series Windows target Slio target

This machine involves oracle database and has never been involved before. I also take this opportunity to get familiar with the operation method of this database; As well as the knowledge about memory forensics, I just learned the forensics master in the Meiya Cup last time, so I also took this opportunity to learn the relevant knowledge of for ...

Posted by rdoylelmt on Thu, 27 Jan 2022 20:21:25 +0100

Struts vulnerability collection

Struts vulnerability collection Some Strtus2 vulnerabilities are summarized. Although there are few vulnerabilities in this part, it is also a part of learning. The collection is not comprehensive, and will be supplemented later. The vulnerability environment can be built using the online vulfucus or deployed using docker S2-001 (CVE-2007-45 ...

Posted by TylerL on Mon, 24 Jan 2022 19:31:46 +0100

ThinkPHP6.0 deserialization vulnerability

ThinkPHP6.0 deserialization vulnerability preface In learning the master's thinkphp6 Recurrence of deserialization vulnerability in 0. X article I found that the TP version I downloaded was the repaired version. So change the old chain to reach RCE. Before reading this article, let's take a look at the above-mentioned master's article. Repai ...

Posted by Vebut on Fri, 21 Jan 2022 20:32:40 +0100

[JavaWeb] deserialization analysis -- CommonCollections1

Deserialization analysis (II) -- CommonCollections1 Chain analysis First, create a TransformedMap, in which the second and third parameters are controllable, which will be used later When TransformedMap executes the put method, it will execute the transformKey and transformValue methods respectively It can be seen that in both methods, there ...

Posted by wvwisokee on Thu, 20 Jan 2022 09:13:46 +0100

File upload vulnerability - upload Labs

File upload - upload Labs 1. Introduction to file upload vulnerability When uploading files, the server does not strictly filter the files uploaded by the client, causing the attacker to upload any type of files, including various script files (php,asp,aspx,jsp, etc.), causing the attacker to control the server. During the attack, the uploaded ...

Posted by cl_stef on Mon, 17 Jan 2022 00:32:54 +0100