Shelled Pediy unknown encrypted shell
1, Simple analysis
1. Browse roughly to find the OEP address, fill in the IAT address, obtain the API address, and preliminarily write the general script ①OEP ② Populate IAT address ③ Get API address Fill the address into the script for testing
// 1. Define variables
MOV dwOEP,0047148B
MOV dwGetAPI,001E1914
MOV dwWriteIAT,001E0897
// ...
Added by flyersman on Fri, 31 Dec 2021 09:17:36 +0200
Secondary injection of SQL injection
catalogue
1. Principle
Secondary injection process
2. Experimental process
(1) View initial users table
(2) Registered user
(3) Modify user password
3. Cause
Specific code
4. Defensive measures
1. Principle
Secondary injection can be understood as the injection caused by the malicious data constructed by the attacker being st ...
Added by urgido on Thu, 30 Dec 2021 21:11:53 +0200
FastJson<=1.2.24 JdbcRowSetImpl uses chain analysis
preface The above analyzes the TemplatesImpl utilization chain, analyzes the fastjson parseObject function, understands the whole process of triggering vulnerabilities, and then comes to learn the JdbcRowSetImpl utilization chain. The utilization chain of JdbcRowSetImpl is widely used in practice. There are basically no restrictions on this cha ...
Added by SCRUBBIE1 on Thu, 30 Dec 2021 06:11:17 +0200
CTF_Web: deserialization details CTF classic test questions from shallow to deep
0x00 deserialization problem in CTF
In this kind of problems, we mainly use deserialization to bypass or call various magic methods, so as to construct qualified serialized strings and complete specific functions. At this point, we should be very clear about the execution process of the whole code segment. Let's start with the simplest.
0x01 ...
Added by kemper on Wed, 29 Dec 2021 21:49:17 +0200
Vulnhub customs clearance manual - 03 Raven-1
Background overview:
Download address: https://www.vulnhub.com/entry/raven-1,256/
The IP of the target is 100.10 10.132, add the IP address to the hosts file and map it to the domain name Raven local.
1. Information collection
1.1 scan target host IP
Use the ARP scan - L command to scan the surviving hosts in the LAN.
└─# arp-scan ...
Added by textbox on Wed, 29 Dec 2021 19:30:51 +0200
[pwn learning] format character vulnerability
What is a format character vulnerability
The format string function can accept a variable number of parameters, take the first parameter as the format string, and parse the parameters according to it. Generally speaking, the format string function is to convert the data represented in computer memory into a human readable string format. Al ...
Added by jiayanhuang on Wed, 29 Dec 2021 18:52:22 +0200
Reverse series | AES reverse encryption case analysis
AES encryption details
Introduction: the full name is advanced encryption standard (English Name: Advanced Encryption Standard), also known as Rijndael encryption method in cryptography, which is sponsored by the National Institute of standards and technology of the United States (NIST) was released in 2001 and became an effective standard in ...
Added by WiseGuy on Wed, 29 Dec 2021 17:15:47 +0200
[network security] bottom layer extension and production of deserialization vulnerability WebShell
XMLDecoder deserialization vulnerability underlying
The reference articles have been analyzed in great detail. Here I mainly talk about the final implementation. That is, the use of the Expression class
import java.beans.Expression;
public class test {
public static void main(String[] args)throws Exception {
Parameter();//With ...
Added by Cbrams on Tue, 28 Dec 2021 05:50:04 +0200
Kali system pyenv and Frida environment configuration
preface
This paper introduces the installation of Kali system and the configuration of Frida environment under Kali system.
1, Basic configuration of Kali environment
1. Download Kali system and open Vmware.
Kali official website Download the Vmware version Kali system, unzip it and open it with Vmware.Download the version kali-l ...
Added by ericm on Mon, 27 Dec 2021 17:36:23 +0200
Attack and defense world crypto novice zone wp
base64 (base password)
Learn about base64 first: The result of base64 encoding is a string, in which the characters can include A-Z, A-Z, 0-9, +, \ a total of 64 characters. If these characters appear, consider base64. Generally, if there is = (filling character) after it, it can be determined as base64!
Y3liZXJwZWFjZXtXZWxjb21lX3RvX25ld1 ...
Added by jd023 on Mon, 27 Dec 2021 01:45:42 +0200