Java Security Learning Notes -- deserialization vulnerability utilization chain CC6 chain
Test environment:
jdk1.8(jdk8u71)
Commons Collections4.0
HashSet
HashSet uses the data structure of the Hash table. The time complexity of adding, deleting, modifying and querying is O(1). Set is a set. The elements are not added in order, and there will be no duplicate elements in the set. Combined with this, we can roughly know the ...
Added by 2DaysAway on Mon, 24 Jan 2022 15:14:16 +0200
Apache common collections with Java deserialization vulnerability
Apache common collections with Java deserialization vulnerability
Gongzong No.: Black palm
A blogger who focuses on sharing network security, hot spots in the hacker circle and hacker tool technology area!
preface:
Recently, I calmed down and read a lot of Daniel's notes and blogs. I have gained a lot, so I'd like to record the first ...
Added by messer on Sun, 23 Jan 2022 23:39:34 +0200
National Division awd post game Summary - feel at ease to be an awd bastard
Reprinted in the security guest I sent ha ~, if you are interested, you can click the link https://www.anquanke.com/post/id/245158 Safe guest - thoughtful safe new media
Recently, I participated in the national division competition. My division happens to be the awd competition system, so I summarized the basic exercises about awd to facilitat ...
Added by new2phpcode on Sat, 22 Jan 2022 19:06:09 +0200
fierce! Avoid killing any EXE
Gongzong No.: black palm A blogger who focuses on sharing network security, hot spots in the hacker circle and hacker tool technology area!
PE file
Brief description of PE documents
The full name of PE file is Portable Executable, which means Portable Executable file. Common exe, DLL, OCX, SYS and COM are PE files. PE file is a program fil ...
Added by jane on Thu, 20 Jan 2022 23:03:16 +0200
034 PHP foundation, variables, operators, process control
1: Basic overview of php
The syntax of PHP absorbs the characteristics of popular computer languages such as C language, Java and Perl, which is easy for ordinary programmers to learn The main goal of PHP is to allow web developers to write dynamic pages quickly Simply put, PHP is mainly used to develop various types of website programs S ...
Added by Sangre on Thu, 20 Jan 2022 13:54:26 +0200
Source code analysis of several niche web fingerprint identification tools
Gongzong No.: black palm A blogger who focuses on sharing network security, hot spots in the hacker circle and hacker tool technology area!
Webfinger
brief introduction
This is a very small tool, written by Python 2, using Fofa's fingerprint library Github address: https://github.com/se55i0n/Webfinger
Please refer to the official screensh ...
Added by avianrand on Wed, 19 Jan 2022 17:28:18 +0200
Some people say that SQL injection has been eliminated. Can you beat him???
Last time I wrote an article about SQL injection, someone said that SQL injection is outdated!!!
preface:
This time, four interesting practical cases are used: Hard - common getshell Fast - fast error injection Quasi - injected under the limit of character length 100 Around – around a university safety dog
Although there are only four ...
Added by lukemedway on Tue, 18 Jan 2022 00:14:13 +0200
Network security is based on the sketch framework and selenium and openpyxl libraries to crawl the epidemic statistics and summary information of foreign countries
Network security is based on the sketch framework and selenium and openpyxl libraries to crawl the epidemic statistics and summary information of foreign countries
data sources https://voice.baidu.com/act/newpneumonia/newpneumonia/
thinking Because the data in the target page is dynamically loaded, the response obtained by directly initiatin ...
Added by visionmaster on Sun, 16 Jan 2022 10:08:54 +0200
Guard notes -- deserialization
Due to my weak foundation, I can only make simple records for the time being, which will be supplemented after more detailed explanation and repetition exercises.
Deserialization
serialize
Serialization is the process of converting an object state into a format that can be maintained or transmitted.
The opposite of serialization is deserializ ...
Added by zyntrax on Sun, 16 Jan 2022 05:05:48 +0200
Beginner BGP protocol experiment
Experimental topic
All routers in the network run BGP protocolAll PC s can access each other
Topology construction
Experimental ideas
Enable OSPF protocol in AS 2 to realize internal routing interworkingAS1 and AS2, AS2 and AS3 are adjacent to EBGP, All routers in AS2 are built adjacent to iBGP (in order to avoid routing black holes, al ...
Added by masalastican on Sat, 15 Jan 2022 13:09:42 +0200