File upload learning notes

title: file upload learning notes date: 2021-5-22 tags: penetration test, file upload, basic categories: Penetration test File upload Basics File upload learning notes 2021 / 3 / 6 notes What is a sentence In one sentence, Trojan horse "server" (locally stored script Trojan horse file) It is the execution permission we want to u ...

Added by waygood on Tue, 08 Feb 2022 05:31:45 +0200

File upload bypass summary

To get more learning materials, join the community and further study, please scan my QR code or add memory2000427 to teach in good faith and take a detour. #File upload bypass There are two kinds: one is based on code restriction and the other is based on firewall. In fact, generally speaking, the two are similar. They both detect the legitima ...

Added by simon551 on Sun, 30 Jan 2022 01:45:28 +0200

Near source penetration test

๐ŸŒ• Write in front ๐ŸŠ Blog home page: Scorpio_m7๐ŸŽ‰ Welcome to pay attention ๐Ÿ”Ž give the thumbs-up ๐Ÿ‘ Collection โญ Leave a message ๐Ÿ“๐ŸŒŸ This article is written by Scorpio_m7 original, CSDN first!๐Ÿ“† Starting time: ๐ŸŒน January 28, 2022 ๐ŸŒนโœ‰๏ธ Persistence and hard work will surely bring poetry and distance!๐Ÿ™ The author's level is very limited. If y ...

Added by walnoot on Sat, 29 Jan 2022 02:34:03 +0200

[HTB] Love(vhost blasting, SSRF, registry authorization)

DisclaimersThe host penetrated by this article is legally authorized. The tools and methods used in this article are limited to learning and communication. Please do not use the tools and infiltration ideas used in this article for any illegal purpose. I will not bear any responsibility for all the consequences, nor will I be responsible for an ...

Added by hemlata on Mon, 24 Jan 2022 18:59:28 +0200

fierce! Avoid killing any EXE

Gongzong No.: black palm A blogger who focuses on sharing network security, hot spots in the hacker circle and hacker tool technology area! PE file Brief description of PE documents The full name of PE file is Portable Executable, which means Portable Executable file. Common exe, DLL, OCX, SYS and COM are PE files. PE file is a program fil ...

Added by jane on Thu, 20 Jan 2022 23:03:16 +0200

Source code analysis of several niche web fingerprint identification tools

Gongzong No.: black palm A blogger who focuses on sharing network security, hot spots in the hacker circle and hacker tool technology area! Webfinger brief introduction This is a very small tool, written by Python 2, using Fofa's fingerprint library Github address: https://github.com/se55i0n/Webfinger Please refer to the official screensh ...

Added by avianrand on Wed, 19 Jan 2022 17:28:18 +0200

Some people say that SQL injection has been eliminated. Can you beat him???

Last time I wrote an article about SQL injection, someone said that SQL injection is outdated!!! preface: This time, four interesting practical cases are used: Hard - common getshell Fast - fast error injection Quasi - injected under the limit of character length 100 Around โ€“ around a university safety dog Although there are only four ...

Added by lukemedway on Tue, 18 Jan 2022 00:14:13 +0200

Penetration range - DC1

DC1 Attacker ip: 192.168.1.164 Target ip: 192.168.1.163 Objective: to obtain 5 flag s on the target 1. For intranet penetration, first scan the entire network segment with namp The target machine is 192.168.1.163 2. Continue nmap sniffing port information,. Port 22 / 80 / 111 / 56771 is open 3. Then access port 80 It's a website ...

Added by snk on Sat, 15 Jan 2022 22:40:47 +0200

A security vulnerability analysis

Vulnerability analysis The environment is built with vulhub. The version is Confluence Server 6.10.2 Widget Connector is a plug-in of Confluence. Compare the plug-ins before and after repair Left Confluence 6.13.0 right 6.13.3 widgetconnector-3.1.0.jar!\com\atlassian\confluence\extra\widgetconnector\WidgetMacro.class You can see that th ...

Added by romeo on Sat, 15 Jan 2022 02:27:52 +0200

Information collection_ CDN bypass

Information collection_ CDN bypass What is CDN? Why bypass? โ€‹ The full name of CDN is content delivery network. Its purpose is to enable users to get the requested data more quickly. โ€‹ I found a picture on the Internet. Take Tencent as an example. Users want to visit Tencent's official website to rush QB. First, computers want to know whi ...

Added by killerofet on Wed, 12 Jan 2022 21:40:10 +0200