Shelled Pediy unknown encrypted shell

1, Simple analysis 1. Browse roughly to find the OEP address, fill in the IAT address, obtain the API address, and preliminarily write the general script ①OEP ② Populate IAT address ③ Get API address Fill the address into the script for testing // 1. Define variables MOV dwOEP,0047148B MOV dwGetAPI,001E1914 MOV dwWriteIAT,001E0897 // ...

Added by flyersman on Fri, 31 Dec 2021 09:17:36 +0200

Secondary injection of SQL injection

catalogue 1. Principle Secondary injection process 2. Experimental process (1) View initial users table (2) Registered user (3) Modify user password 3. Cause   Specific code 4. Defensive measures 1. Principle Secondary injection can be understood as the injection caused by the malicious data constructed by the attacker being st ...

Added by urgido on Thu, 30 Dec 2021 21:11:53 +0200

FastJson<=1.2.24 JdbcRowSetImpl uses chain analysis

preface The above analyzes the TemplatesImpl utilization chain, analyzes the fastjson parseObject function, understands the whole process of triggering vulnerabilities, and then comes to learn the JdbcRowSetImpl utilization chain. The utilization chain of JdbcRowSetImpl is widely used in practice. There are basically no restrictions on this cha ...

Added by SCRUBBIE1 on Thu, 30 Dec 2021 06:11:17 +0200

CTF_Web: deserialization details CTF classic test questions from shallow to deep

0x00 deserialization problem in CTF In this kind of problems, we mainly use deserialization to bypass or call various magic methods, so as to construct qualified serialized strings and complete specific functions. At this point, we should be very clear about the execution process of the whole code segment. Let's start with the simplest. 0x01 ...

Added by kemper on Wed, 29 Dec 2021 21:49:17 +0200

Vulnhub customs clearance manual - 03 Raven-1

Background overview: Download address: https://www.vulnhub.com/entry/raven-1,256/ The IP of the target is 100.10 10.132, add the IP address to the hosts file and map it to the domain name Raven local. 1. Information collection 1.1 scan target host IP Use the ARP scan - L command to scan the surviving hosts in the LAN. └─# arp-scan ...

Added by textbox on Wed, 29 Dec 2021 19:30:51 +0200

[pwn learning] format character vulnerability

What is a format character vulnerability The format string function can accept a variable number of parameters, take the first parameter as the format string, and parse the parameters according to it. Generally speaking, the format string function is to convert the data represented in computer memory into a human readable string format. Al ...

Added by jiayanhuang on Wed, 29 Dec 2021 18:52:22 +0200

Reverse series | AES reverse encryption case analysis

AES encryption details Introduction: the full name is advanced encryption standard (English Name: Advanced Encryption Standard), also known as Rijndael encryption method in cryptography, which is sponsored by the National Institute of standards and technology of the United States (NIST) was released in 2001 and became an effective standard in ...

Added by WiseGuy on Wed, 29 Dec 2021 17:15:47 +0200

[network security] bottom layer extension and production of deserialization vulnerability WebShell

XMLDecoder deserialization vulnerability underlying The reference articles have been analyzed in great detail. Here I mainly talk about the final implementation. That is, the use of the Expression class import java.beans.Expression; public class test { public static void main(String[] args)throws Exception { Parameter();//With ...

Added by Cbrams on Tue, 28 Dec 2021 05:50:04 +0200

Kali system pyenv and Frida environment configuration

preface This paper introduces the installation of Kali system and the configuration of Frida environment under Kali system. 1, Basic configuration of Kali environment 1. Download Kali system and open Vmware. Kali official website Download the Vmware version Kali system, unzip it and open it with Vmware.Download the version kali-l ...

Added by ericm on Mon, 27 Dec 2021 17:36:23 +0200

Attack and defense world crypto novice zone wp

base64 (base password) Learn about base64 first: The result of base64 encoding is a string, in which the characters can include A-Z, A-Z, 0-9, +, \ a total of 64 characters. If these characters appear, consider base64. Generally, if there is = (filling character) after it, it can be determined as base64! Y3liZXJwZWFjZXtXZWxjb21lX3RvX25ld1 ...

Added by jd023 on Mon, 27 Dec 2021 01:45:42 +0200