[quick start Nessus - beginner level]

What is Nessus? This is a vulnerability scanning system based on C/S architecture What is vulnerability scanning? Vulnerability scanning is a technical means to find the vulnerabilities of the target system, and further use the discovered vulnerabilities to do something they have always wanted to do but couldn't do before, such as penetratio ...

Posted by voitek on Mon, 03 Jan 2022 03:08:52 +0100

Based on seedubuntu20 04 cross site scripting attack (XSS)

XSS attack is similar to CSRF, but it is more difficult and common than CSRF. CSRF is to forge a cross site request. He has to cheat others into his well-designed website first, but when an untrusted third-party website jumps, the site will often intimate remind you of the risk of being attacked. But the cross site scripting attack is differen ...

Posted by aruns on Mon, 27 Dec 2021 06:46:23 +0100

WP of the preliminary competition of the third "fifth space" cyber security competition

Preliminary competition of the third "fifth space" cyber security competition Official account: Th0r security web webftp Sweep path to 1 txt. . Direct access 1 Txt can see the flag, because it is a static target, so it should be put in by other masters. I dare not say and I dare not ask. f1ag{g28F28EPTjRoxM9sNBDtMS3ZPuIPX ...

Posted by pro on Sat, 25 Dec 2021 13:02:16 +0100

DVWA SQL Injection(blind) full level

SQL Injection(blind) 1. Low Manual injection method The server will only return and not display the search value. This kind of SQL injection without echo is called SQL blind injection. This question will only return whether the user exists or not, that is, true or false. This kind of blind note becomes Boolean blind note. The injection ...

Posted by acook on Thu, 23 Dec 2021 16:57:41 +0100

ThinkPHP5 remote code execution

Vulnerability summary The flaw lies in that the bottom layer of ThinkPHP does not check the validity of the controller name well, resulting in that the user can call any method of any class without opening the forced routing, which eventually leads to a remote code execution vulnerabilityVulnerability impact version: 5.0.7<=ThinkPHP5 ...

Posted by scarabee on Thu, 23 Dec 2021 10:48:12 +0100

Wave after wave, VMware released another high-risk vulnerability

VMware customers had a very busy week due to the vulnerability of Apache Log4j 2, Nearly half of global enterprises are affected,According to a report provided by the Threat Intelligence Department of Check Point, a well-known network security solution provider , the Apache Log4j 2 vulnerability may persist. This means that VMware customers ha ...

Posted by mdell on Wed, 22 Dec 2021 04:48:10 +0100

ThinkPHP5.0.x deserialization

Vulnerability environment Vulnerability test environment: PHP5 6+ThinkPHP5. zero point two fourVulnerability test code: application / index / controller / index php <?php namespace app\index\controller; class Index { public function index() { $Gyan = unserialize($_GET['d1no']); var_dump($Gyan); return '&lt ...

Posted by urb on Tue, 21 Dec 2021 10:28:30 +0100

SQL lab shooting range explanation

sql injection is When the user enters some sql statements that are not the user name or password These statements are not filtered After execution, the injector obtains the information of the database through echo and other methods Water has been used for several days for visual studio 2022 and windows 11, so this article is a little ...

Posted by not_john on Thu, 16 Dec 2021 15:23:39 +0100

Attack and defense World Web_ php_ wrong_ nginx_ config

Open the scenario, just a login interface, try SQL injection, and nothing is found Then scan the list Sweep out the / admin directory and / robots Txt, enter robots Take a look User-agent: *Disallow: hint.php Hack.php Two more clues Look at hint There may be a problem with the PHP configuration file: / etc / nginx / sites enabled / site conf I ...

Posted by Anarking on Thu, 16 Dec 2021 08:45:44 +0100

Command injection summary

Command injection summary Command injection is to execute arbitrary commands on the host operating system through vulnerable applications. In this attack, the operating system commands provided by the attacker are usually executed with the privileges of the vulnerable application. Command injection attacks are likely to be mainly due to in ...

Posted by xenooreo on Wed, 15 Dec 2021 07:33:32 +0100