Load DLL by modifying PE file
target
The goal of this experiment is to modify the TextView directly. Exe file to automatically load myhack at run time. DLL file.
TextView.exe
TextView.exe is a very simple text viewer that allows you to view the contents of a text file by dragging it (Drop) with the mouse.
View TextView using the PEView tool. IDT of exe executable (Imp ...
Added by youqing on Fri, 24 Dec 2021 15:03:12 +0200
Analysis of arbitrary file upload vulnerability of security vulnerability
preface
The front desk arbitrary file upload vulnerability of X micro e-office has been exposed for some time, and the related vulnerability exploitation scripts or even vulnerability batch exploitation scripts
There are also many. Here, analyze this vulnerability point according to the system code and POC.
Locate vulnerability points
Accor ...
Added by Absorbator on Wed, 22 Dec 2021 17:04:23 +0200
linux_kernal_pwn ciscn2017_babydriver
It's kernal pwn
Three documents were given
boot.sh: a script used to start the shell of the kernel. It uses qemu. The protection measures are related to different startup parameters of qemu bzImage: packaged kernel code. vmlinx is usually extracted through it. It is also here to find gadget s rootfs.cpio: file system image, that is, the file ...
Added by point86 on Sun, 19 Dec 2021 07:45:05 +0200
vulnstack red sun range reappearance
Note: if you have any questions while reading this replay, welcome vx: bestboysundit to communicate
catalog:
1, Environment configuration
2, Extranet test: 3, Get session: 01 information collection 0201 get session - msf 0201 get session - cs 4, Intranet penetration: 5, Reference link:
Open the virtual machine image to the suspended state a ...
Added by gth759k on Sun, 19 Dec 2021 02:49:34 +0200
Huawei hardware configuration command, recommended collection
backup elabelCommand functionThe backup elabel command is used to back up the electronic label information of the device to the storage medium of the device.The backup elabel ftp command is used to back up the electronic label information of the device to the specified FTP server.The backup elabel tftp command is used to back up the electronic ...
Added by arcticwolf on Fri, 17 Dec 2021 10:40:12 +0200
vulnhub DC9 range practice
preface
The target for this exercise is the 9th and last DC series target under vulnhub platform. The download address is https://www.vulnhub.com/entry/dc-9,412/ . The ultimate goal of challenging the target is to obtain root permission and then read the unique flag. The difficulty of this target is medium. The key point is to know the knockd ...
Added by rsassine on Wed, 15 Dec 2021 21:15:04 +0200
Network Security Learning -- file sharing
Shared server
Provide file sharing services through the network, and provide file download and upload
Set up a shared folder on Win2003 Enter the win2003IP address in Win+R on the Win7 virtual machine Click OK and enter the user name and password. After successful verification, the shared folder will be displayed
Permissions for shared fold ...
Added by hlstriker on Sat, 27 Nov 2021 06:33:36 +0200
What is cross domain resource sharing (CORS)?
1, What is CORS?
For security reasons, the browser restricts cross domain HTTP requests initiated by scripts unless the server agrees to access. For example, if the server's response Header to the pre check request contains access control allow origin: *, the cross domain request can be accessed correctly.
2, Examples of hazards
If the mal ...
Added by gargoylemusic on Wed, 24 Nov 2021 02:38:20 +0200
Password cracking and HASH computing
Password cracking
1. Introduction to password cracking
·Manual guessing
Trash can project, passive information collection
·Dictionary based brute force cracking (mainstream)
·Keyboard space character explosion
·Dictionary
Text file with user name and password (kali's own dictionary)
-/usr/share/wordlist
-/us ...
Added by sager29 on Sat, 20 Nov 2021 20:19:24 +0200
This paper solves all search backtracking problems of sword finger Offer
1. Sword finger Offer 32 - I. print binary tree from top to bottom
Sword finger Offer 32 - I. print binary tree from top to bottom
Idea: use the queue to traverse the hierarchy
class Solution {
public int[] levelOrder(TreeNode root) {
if(root==null)
return new int[0];//When root is null, return []
A ...
Added by trent2800 on Wed, 17 Nov 2021 07:25:26 +0200