File upload learning notes
title: file upload learning notes date: 2021-5-22 tags: penetration test, file upload, basic categories:
Penetration test File upload Basics
File upload learning notes
2021 / 3 / 6 notes
What is a sentence
In one sentence, Trojan horse "server" (locally stored script Trojan horse file)
It is the execution permission we want to u ...
Added by waygood on Tue, 08 Feb 2022 05:31:45 +0200
File upload bypass summary
To get more learning materials, join the community and further study, please scan my QR code or add memory2000427 to teach in good faith and take a detour. #File upload bypass
There are two kinds: one is based on code restriction and the other is based on firewall. In fact, generally speaking, the two are similar. They both detect the legitima ...
Added by simon551 on Sun, 30 Jan 2022 01:45:28 +0200
Near source penetration test
๐ Write in front
๐ Blog home page: Scorpio_m7๐ Welcome to pay attention ๐ give the thumbs-up ๐ Collection โญ Leave a message ๐๐ This article is written by Scorpio_m7 original, CSDN first!๐ Starting time: ๐น January 28, 2022 ๐นโ๏ธ Persistence and hard work will surely bring poetry and distance!๐ The author's level is very limited. If y ...
Added by walnoot on Sat, 29 Jan 2022 02:34:03 +0200
[HTB] Love(vhost blasting, SSRF, registry authorization)
DisclaimersThe host penetrated by this article is legally authorized. The tools and methods used in this article are limited to learning and communication. Please do not use the tools and infiltration ideas used in this article for any illegal purpose. I will not bear any responsibility for all the consequences, nor will I be responsible for an ...
Added by hemlata on Mon, 24 Jan 2022 18:59:28 +0200
fierce! Avoid killing any EXE
Gongzong No.: black palm A blogger who focuses on sharing network security, hot spots in the hacker circle and hacker tool technology area!
PE file
Brief description of PE documents
The full name of PE file is Portable Executable, which means Portable Executable file. Common exe, DLL, OCX, SYS and COM are PE files. PE file is a program fil ...
Added by jane on Thu, 20 Jan 2022 23:03:16 +0200
Source code analysis of several niche web fingerprint identification tools
Gongzong No.: black palm A blogger who focuses on sharing network security, hot spots in the hacker circle and hacker tool technology area!
Webfinger
brief introduction
This is a very small tool, written by Python 2, using Fofa's fingerprint library Github address: https://github.com/se55i0n/Webfinger
Please refer to the official screensh ...
Added by avianrand on Wed, 19 Jan 2022 17:28:18 +0200
Some people say that SQL injection has been eliminated. Can you beat him???
Last time I wrote an article about SQL injection, someone said that SQL injection is outdated!!!
preface:
This time, four interesting practical cases are used: Hard - common getshell Fast - fast error injection Quasi - injected under the limit of character length 100 Around โ around a university safety dog
Although there are only four ...
Added by lukemedway on Tue, 18 Jan 2022 00:14:13 +0200
Penetration range - DC1
DC1
Attacker ip: 192.168.1.164
Target ip: 192.168.1.163
Objective: to obtain 5 flag s on the target
1. For intranet penetration, first scan the entire network segment with namp
The target machine is 192.168.1.163
2. Continue nmap sniffing port information,.
Port 22 / 80 / 111 / 56771 is open
3. Then access port 80
It's a website ...
Added by snk on Sat, 15 Jan 2022 22:40:47 +0200
A security vulnerability analysis
Vulnerability analysis
The environment is built with vulhub. The version is
Confluence Server 6.10.2
Widget Connector is a plug-in of Confluence. Compare the plug-ins before and after repair
Left Confluence 6.13.0 right 6.13.3
widgetconnector-3.1.0.jar!\com\atlassian\confluence\extra\widgetconnector\WidgetMacro.class
You can see that th ...
Added by romeo on Sat, 15 Jan 2022 02:27:52 +0200
Information collection_ CDN bypass
Information collection_ CDN bypass
What is CDN? Why bypass?
โ The full name of CDN is content delivery network. Its purpose is to enable users to get the requested data more quickly.
โ I found a picture on the Internet. Take Tencent as an example. Users want to visit Tencent's official website to rush QB. First, computers want to know whi ...
Added by killerofet on Wed, 12 Jan 2022 21:40:10 +0200