Load DLL by modifying PE file

target The goal of this experiment is to modify the TextView directly. Exe file to automatically load myhack at run time. DLL file. TextView.exe TextView.exe is a very simple text viewer that allows you to view the contents of a text file by dragging it (Drop) with the mouse. View TextView using the PEView tool. IDT of exe executable (Imp ...

Added by youqing on Fri, 24 Dec 2021 15:03:12 +0200

Analysis of arbitrary file upload vulnerability of security vulnerability

preface The front desk arbitrary file upload vulnerability of X micro e-office has been exposed for some time, and the related vulnerability exploitation scripts or even vulnerability batch exploitation scripts There are also many. Here, analyze this vulnerability point according to the system code and POC. Locate vulnerability points Accor ...

Added by Absorbator on Wed, 22 Dec 2021 17:04:23 +0200

linux_kernal_pwn ciscn2017_babydriver

It's kernal pwn Three documents were given boot.sh: a script used to start the shell of the kernel. It uses qemu. The protection measures are related to different startup parameters of qemu bzImage: packaged kernel code. vmlinx is usually extracted through it. It is also here to find gadget s rootfs.cpio: file system image, that is, the file ...

Added by point86 on Sun, 19 Dec 2021 07:45:05 +0200

vulnstack red sun range reappearance

Note: if you have any questions while reading this replay, welcome vx: bestboysundit to communicate catalog: 1, Environment configuration 2, Extranet test: 3, Get session: 01 information collection 0201 get session - msf 0201 get session - cs 4, Intranet penetration: 5, Reference link: Open the virtual machine image to the suspended state a ...

Added by gth759k on Sun, 19 Dec 2021 02:49:34 +0200

Huawei hardware configuration command, recommended collection

backup elabelCommand functionThe backup elabel command is used to back up the electronic label information of the device to the storage medium of the device.The backup elabel ftp command is used to back up the electronic label information of the device to the specified FTP server.The backup elabel tftp command is used to back up the electronic ...

Added by arcticwolf on Fri, 17 Dec 2021 10:40:12 +0200

vulnhub DC9 range practice

preface The target for this exercise is the 9th and last DC series target under vulnhub platform. The download address is https://www.vulnhub.com/entry/dc-9,412/ . The ultimate goal of challenging the target is to obtain root permission and then read the unique flag. The difficulty of this target is medium. The key point is to know the knockd ...

Added by rsassine on Wed, 15 Dec 2021 21:15:04 +0200

Network Security Learning -- file sharing

Shared server Provide file sharing services through the network, and provide file download and upload Set up a shared folder on Win2003 Enter the win2003IP address in Win+R on the Win7 virtual machine Click OK and enter the user name and password. After successful verification, the shared folder will be displayed Permissions for shared fold ...

Added by hlstriker on Sat, 27 Nov 2021 06:33:36 +0200

What is cross domain resource sharing (CORS)?

1, What is CORS? For security reasons, the browser restricts cross domain HTTP requests initiated by scripts unless the server agrees to access. For example, if the server's response Header to the pre check request contains access control allow origin: *, the cross domain request can be accessed correctly. 2, Examples of hazards If the mal ...

Added by gargoylemusic on Wed, 24 Nov 2021 02:38:20 +0200

Password cracking and HASH computing

Password cracking 1. Introduction to password cracking ·Manual guessing Trash can project, passive information collection ·Dictionary based brute force cracking (mainstream) ·Keyboard space character explosion ·Dictionary Text file with user name and password (kali's own dictionary) -/usr/share/wordlist -/us ...

Added by sager29 on Sat, 20 Nov 2021 20:19:24 +0200

This paper solves all search backtracking problems of sword finger Offer

1. Sword finger Offer 32 - I. print binary tree from top to bottom Sword finger Offer 32 - I. print binary tree from top to bottom Idea: use the queue to traverse the hierarchy class Solution { public int[] levelOrder(TreeNode root) { if(root==null) return new int[0];//When root is null, return [] A ...

Added by trent2800 on Wed, 17 Nov 2021 07:25:26 +0200