Safety - Misc Mingchu love (Xiangyun cup 2021)
1, Title
2, WriteUp
[1]. Get compressed package
Directly modify the suffix of the document to zip or use binwalk -e [file name] in kalinux to obtain a compressed package
The contents are as follows
[2]. Tips
In_ There is a key in rels Txt, said to move forward bravely, indicating that the flag is likely to be i ...
Added by Thivya on Mon, 20 Dec 2021 03:34:43 +0200
Kernel rop attack 2018QWBcore replay
Foreword: I just started the core problem recently, so I'll learn from ctfwiki here. Don't spray...
The first step is classic... If the title is not given to vmlinux, it can be extracted through extract vmlinux.
See start SH finds that kalsr randomization is enabled, and the base address needs to be leaked. This is very similar to the pwn pro ...
Added by turkman on Sat, 18 Dec 2021 20:57:35 +0200
Comprehensive target experiment
1, Experiment Title: Comprehensive Target Experiment
2, Experiment content:
1. Use msf to search for exploitable vulnerabilities (drupal)
2. Find the configuration file of the target website
3. Database administrator authorization (update administrator password or add a new user)
4. suid authorization command (nmap, vim, find, bash, more ...
Added by HK2ALL on Thu, 16 Dec 2021 14:39:17 +0200
Implementing rights management system with spring security
For space reasons, please refer to this article to realize the login function first https://blog.csdn.net/grd_java/article/details/121925792
1, Database tables, and entity classes
Because the front end is written by VUE, components and paths need to be saved
sql statements for all libraries
2, Menu management TODO
fi ...
Added by michaelpalmer7 on Thu, 16 Dec 2021 07:45:51 +0200
No.8 CA certificate and SSH service
1. Create a private CA and apply for a certificate.
1.1 create CA related directories and files
[22:05:51 root@centos8 data]#mkdir -pv /etc/pki/CA/{certs,crl,newcerts,private}
mkdir: created directory '/etc/pki/CA'
mkdir: created directory '/etc/pki/CA/certs'
mkdir: created directory '/etc/pki/CA/crl'
mkdir: created directory '/etc/pki/CA/new ...
Added by jprazen on Wed, 15 Dec 2021 10:24:00 +0200
27, K8s minimum service vulnerability 1-PSP
1, Experimental environment
The underlying system is Ubuntu 18 04, then install k8s on each node and build a cluster. The IP address of the Master node is 192.168 26.71/24, the IP address of two worker nodes is 192.168 26.72/24,192.168. 26.73/24.
2, PSP Foundation
1.PSP overview Pod Security Policy is a cluster level resource (it does not ...
Added by wei on Wed, 15 Dec 2021 04:26:27 +0200
redis does not perform vulnerability access
Vulnerability introduction and harm
Redis is bound to 0.0.0 by default 0.0:6379. If relevant policies are not adopted, such as configuring firewall rules to avoid IP access from other untrusted sources, redis service will be exposed to the public network; If password authentication is not set (generally empty), any user can access Redis an ...
Added by aufkes on Tue, 14 Dec 2021 14:49:48 +0200
Cryptography to achieve DES working mode codebook mode ECB cipher packet link mode CBC java python implementation
Realize the working mode of DES
1, Experimental purpose
Master the working principle of DES algorithm; Familiar with the working mode of packet encryption algorithm.
2, Experimental principle
Basic principle of DES
ppop has three entry parameters: key, data and mode. Key is the key used for encryption and decryption, data is the encrypt ...
Added by rationalrabbit on Sun, 12 Dec 2021 12:26:08 +0200
Introduction to CTFSHOW web 21-28
CTFSHOW blasting [21-28]
Web21
You can see that the selected text - > decoded from is decoded by Base64 The format of account password is [username]:[password] So we can use the custom payload in the introder module
position 1: admin position 2: (:) is a colon and does not need parentheses (easy to see) position 3: you can use the ...
Added by foxy69 on Sat, 11 Dec 2021 12:23:41 +0200
Thread Foundation (optimistic lock and pessimistic lock)
Pessimistic lock
When modifying a piece of data, in order to prevent others from changing the data at the same time, we can lock the data through the locking mechanism to prevent concurrency problems;
Threads think that thread security problems are easy to occur and lock the code.
Because the process of locking and releasing pess ...
Added by php_jord on Sat, 11 Dec 2021 10:04:25 +0200