[quick start Nessus - beginner level]
What is Nessus?
This is a vulnerability scanning system based on C/S architecture
What is vulnerability scanning?
Vulnerability scanning is a technical means to find the vulnerabilities of the target system, and further use the discovered vulnerabilities to do something they have always wanted to do but couldn't do before, such as penetratio ...
Posted by voitek on Mon, 03 Jan 2022 03:08:52 +0100
Based on seedubuntu20 04 cross site scripting attack (XSS)
XSS attack is similar to CSRF, but it is more difficult and common than CSRF.
CSRF is to forge a cross site request. He has to cheat others into his well-designed website first, but when an untrusted third-party website jumps, the site will often intimate remind you of the risk of being attacked. But the cross site scripting attack is differen ...
Posted by aruns on Mon, 27 Dec 2021 06:46:23 +0100
WP of the preliminary competition of the third "fifth space" cyber security competition
Preliminary competition of the third "fifth space" cyber security competition
Official account: Th0r security
web
webftp
Sweep path to 1 txt. . Direct access 1 Txt can see the flag, because it is a static target, so it should be put in by other masters. I dare not say and I dare not ask. f1ag{g28F28EPTjRoxM9sNBDtMS3ZPuIPX ...
Posted by pro on Sat, 25 Dec 2021 13:02:16 +0100
DVWA SQL Injection(blind) full level
SQL Injection(blind)
1. Low
Manual injection method
The server will only return and not display the search value. This kind of SQL injection without echo is called SQL blind injection.
This question will only return whether the user exists or not, that is, true or false. This kind of blind note becomes Boolean blind note.
The injection ...
Posted by acook on Thu, 23 Dec 2021 16:57:41 +0100
ThinkPHP5 remote code execution
Vulnerability summary
The flaw lies in that the bottom layer of ThinkPHP does not check the validity of the controller name well, resulting in that the user can call any method of any class without opening the forced routing, which eventually leads to a remote code execution vulnerabilityVulnerability impact version: 5.0.7<=ThinkPHP5 ...
Posted by scarabee on Thu, 23 Dec 2021 10:48:12 +0100
Wave after wave, VMware released another high-risk vulnerability
VMware customers had a very busy week due to the vulnerability of Apache Log4j 2, Nearly half of global enterprises are affected,According to a report provided by the Threat Intelligence Department of Check Point, a well-known network security solution provider , the Apache Log4j 2 vulnerability may persist. This means that VMware customers ha ...
Posted by mdell on Wed, 22 Dec 2021 04:48:10 +0100
ThinkPHP5.0.x deserialization
Vulnerability environment
Vulnerability test environment: PHP5 6+ThinkPHP5. zero point two fourVulnerability test code: application / index / controller / index php
<?php
namespace app\index\controller;
class Index
{
public function index()
{
$Gyan = unserialize($_GET['d1no']);
var_dump($Gyan);
return '< ...
Posted by urb on Tue, 21 Dec 2021 10:28:30 +0100
SQL lab shooting range explanation
sql injection is
When the user enters some sql statements that are not the user name or password
These statements are not filtered
After execution, the injector obtains the information of the database through echo and other methods
Water has been used for several days for visual studio 2022 and windows 11, so this article is a little ...
Posted by not_john on Thu, 16 Dec 2021 15:23:39 +0100
Attack and defense World Web_ php_ wrong_ nginx_ config
Open the scenario, just a login interface, try SQL injection, and nothing is found Then scan the list Sweep out the / admin directory and / robots Txt, enter robots Take a look User-agent: *Disallow:
hint.php Hack.php Two more clues Look at hint There may be a problem with the PHP configuration file: / etc / nginx / sites enabled / site conf I ...
Posted by Anarking on Thu, 16 Dec 2021 08:45:44 +0100
Command injection summary
Command injection summary
Command injection is to execute arbitrary commands on the host operating system through vulnerable applications. In this attack, the operating system commands provided by the attacker are usually executed with the privileges of the vulnerable application. Command injection attacks are likely to be mainly due to in ...
Posted by xenooreo on Wed, 15 Dec 2021 07:33:32 +0100