vulnhub shooting range - the planes: Earth
THE PLANETS:EARTH
prepare
Attacker: kali
Target: the planes: Earth NAT 192.168.91.0 network segment
Download connection
[https://www.vulnhub.com/entry/the-planets-earth,755/]
Information collection and utilization
Host discovery
https://github.com/czheisenberg/MyCode/blob/master/Scan/scapy/ping.py
As shown in the figure, use python s ...
Added by pureDesi on Sat, 12 Feb 2022 12:46:46 +0200
Simple domain penetration
Refer to the connection of master
Intranet penetration - complete domain penetration
Some basic knowledge
Domain:
A computer domain is a collection of computers with security boundaries. Computers in the same domain have established a trust relationship with each other. Accessing other machines in the domain no longer requires the permi ...
Added by jkohns on Sat, 12 Feb 2022 07:32:03 +0200
[penetration test] Vulnstack red team
Domain environment initialization
DC
IP: 10.10.10.10 OS: Windows 2012(64)
Application: AD field
WEB
IP1: 10.10.10.80 IP2: 192.168.111.80 OS: Windows 2008(64)
Application: Weblogic 10.3.6 MSSQL 2008
PC
IP1: 10.10.10.201 IP2: 192.168.111.201 OS: Windows 7(32)
Application:
Attack aircraft
IP: 192.168.111.5 OS: Kali
weblogic exploit
nm ...
Added by alasxdair on Fri, 11 Feb 2022 12:40:12 +0200
Security - Code Execution Vulnerability recurrence of Fastjson version 1.2.24 or less (vulhub)
preface
Skip the installation of the environment. Please Baidu yourself for the installation of the environment This article is only for learning records. Please do not use it for illegal purposes The contents in brackets are variable values and need to be modified according to the actual situation
Fastjson 1.2.24 Download
Java comm ...
Added by machina3k on Tue, 08 Feb 2022 21:31:00 +0200
Code audit learning XSS
definition
Cross site scripting attack is not confused with css, so cross site scripting attack is abbreviated as XSS. XSS is a security vulnerability of Web application, which is mainly caused by insufficient filtering of user input by Web application. The malicious attacker inserts the malicious script code into the Web page. When the user b ...
Added by whizzykid on Sat, 05 Feb 2022 04:12:52 +0200
Near source penetration test
๐ Write in front
๐ Blog home page: Scorpio_m7๐ Welcome to pay attention ๐ give the thumbs-up ๐ Collection โญ Leave a message ๐๐ This article is written by Scorpio_m7 original, CSDN first!๐ Starting time: ๐น January 28, 2022 ๐นโ๏ธ Persistence and hard work will surely bring poetry and distance!๐ The author's level is very limited. If y ...
Added by walnoot on Sat, 29 Jan 2022 02:34:03 +0200
sql injection Journal
Pre school instructions
In MySQL version 5.0 and above, information is defined by default to facilitate management_ Schema database is used to store database meta information, including table schemata (database name), table (table name) and columns (field name and column name)
Basic syntax learning of sql statements https://www.w3school.com.c ...
Added by piyushsharmajec on Thu, 27 Jan 2022 14:46:16 +0200
BossCMSV1.0 code audit
BossCMSV1.0 code audit
preface
The article originated in the prophet community BossCMSV1.0 code audit
The following vulnerabilities have been submitted to CNVD and included
Background arbitrary file upload
Add the allowed upload type in the background security settings php
Then upload the php Trojan horse file getshell through the attachm ...
Added by jesbin on Thu, 27 Jan 2022 08:02:22 +0200
ssrf vulnerability description
ssrf is a security vulnerability in which an attacker constructs a request and the server initiates the request. Generally, the target of ssrf attack is the internal system that cannot be accessed by the external network
Principle of ssrf vulnerability SSRF is mostly formed because the server provides the function of obtaining data from other ...
Added by apsomum on Wed, 26 Jan 2022 06:18:02 +0200
[JavaWeb] struts 2-001 vulnerability analysis
Strut2-001
Vulnerability description
When the framework parses the JSP page tag, it will obtain the Value value entered by the user. In obtaining the corresponding Value value, it recursively parses% {,}, resulting in secondary parsing, and finally triggers the expression injection vulnerability to execute arbitrary code
Impact version
2.0.1 ~ ...
Added by roldahayes on Sun, 16 Jan 2022 20:44:15 +0200