Analysis of arbitrary file upload vulnerability of security vulnerability
preface
The front desk arbitrary file upload vulnerability of X micro e-office has been exposed for some time, and the related vulnerability exploitation scripts or even vulnerability batch exploitation scripts
There are also many. Here, analyze this vulnerability point according to the system code and POC.
Locate vulnerability points
Accor ...
Added by Absorbator on Wed, 22 Dec 2021 17:04:23 +0200
vulnhub DC9 range practice
preface
The target for this exercise is the 9th and last DC series target under vulnhub platform. The download address is https://www.vulnhub.com/entry/dc-9,412/ . The ultimate goal of challenging the target is to obtain root permission and then read the unique flag. The difficulty of this target is medium. The key point is to know the knockd ...
Added by rsassine on Wed, 15 Dec 2021 21:15:04 +0200
Principle analysis of JAVA deserialization vulnerability
Principle analysis of deserialization vulnerability
Start with serialization and deserialization
What are serialization and deserialization? In short, serialization is the process of converting an object into a byte sequence (that is, a form that can be stored or transmitted), while deserialization is its inverse operation, that is, the pro ...
Added by ShaileshD on Tue, 12 Oct 2021 08:44:30 +0300