Analysis of arbitrary file upload vulnerability of security vulnerability

preface The front desk arbitrary file upload vulnerability of X micro e-office has been exposed for some time, and the related vulnerability exploitation scripts or even vulnerability batch exploitation scripts There are also many. Here, analyze this vulnerability point according to the system code and POC. Locate vulnerability points Accor ...

Added by Absorbator on Wed, 22 Dec 2021 17:04:23 +0200

vulnhub DC9 range practice

preface The target for this exercise is the 9th and last DC series target under vulnhub platform. The download address is https://www.vulnhub.com/entry/dc-9,412/ . The ultimate goal of challenging the target is to obtain root permission and then read the unique flag. The difficulty of this target is medium. The key point is to know the knockd ...

Added by rsassine on Wed, 15 Dec 2021 21:15:04 +0200

Principle analysis of JAVA deserialization vulnerability

Principle analysis of deserialization vulnerability Start with serialization and deserialization What are serialization and deserialization? In short, serialization is the process of converting an object into a byte sequence (that is, a form that can be stored or transmitted), while deserialization is its inverse operation, that is, the pro ...

Added by ShaileshD on Tue, 12 Oct 2021 08:44:30 +0300