A security vulnerability analysis
Vulnerability analysis
The environment is built with vulhub. The version is
Confluence Server 6.10.2
Widget Connector is a plug-in of Confluence. Compare the plug-ins before and after repair
Left Confluence 6.13.0 right 6.13.3
widgetconnector-3.1.0.jar!\com\atlassian\confluence\extra\widgetconnector\WidgetMacro.class
You can see that th ...
Added by romeo on Sat, 15 Jan 2022 02:27:52 +0200
File upload (11-19)
Today, I saw the source code of the shooting range uploaded by the file, all of which have flag files
Looks like I lost a billion
Simply put the source code on the small skin of the virtual machine (because the machine has a mysql environment, it is not willing to delete, but also useful)
A new station was established with the help o ...
Added by celavi on Thu, 13 Jan 2022 15:59:23 +0200
High version jdk bypass of jndi injection in Java deserialization
The leaders in the group have fun. Take out the vegetable chicken, sort it out and study it, and fry some cold rice.
It mainly includes the following three parts:
jndi injection principle
jndi injection and deserialization
jndi injection and jdk version
jndi injection principle:
JNDI (Java name and Dictionary interface), a set of Java EE stan ...
Added by xconspirisist on Tue, 11 Jan 2022 13:17:44 +0200
Common network security terminology
1. Black hat
A person who hacks for illegal purposes, usually for economic gain. They enter the secure network to destroy, redeem, modify or steal data, or make the network unavailable to authorized users. The name comes from the fact that villains in old-fashioned black-and-white western films are easy to be recognized by film viewers because ...
Added by GiaTuan on Sun, 09 Jan 2022 03:36:27 +0200
Domain penetration of three-layer network protection
Environmental preparation
Network topology
The network topology is as follows:
Configure network card
Since the address of the virtual machine has been written to death, problems are likely to occur if it is changed. Therefore, directly create two network cards vm18 and vm19, and specify the following subnet addresses
For a web serve ...
Added by gdhanasekar on Fri, 07 Jan 2022 13:54:32 +0200
Cve-2021-45232 Apache APIs IX never authorized access to RCE
00x1 vulnerability environment
Apache APIs IX dashboard version 2.7 - 2.10 is affected
Build an environment in docker by pulling git
git clone https://github.com/apache/apisix-docker
Note that you need to change the yml file to version 2.7
Then use docker to build it
00x2 attack process
After the environment runs, it successfully ...
Added by hobeau on Wed, 05 Jan 2022 16:47:35 +0200
Huxiang cup 2021 Pastebin recurrence learning
Huxiang cup 2021 Pastebin recurrence learning
1, Introduction to Service Worker
Service Worker can be understood as a proxy server between the client and the server. When a Service Worker is registered in the website, it can intercept the request and judge whether to send the request to the server or directly return it to the client through t ...
Added by ashutosh.titan on Wed, 05 Jan 2022 16:08:44 +0200
Explanation of CSRF and SSRF vulnerability cases - day29
CSRF & SSRF] - explanation of vulnerability cases - day29
1, CSRF - Cross Site Request Forgery Attack
1. Explain
CSRF vulnerability explanation, principle
CSRF(Cross-site request forgery)
Cross Site Request Forgery, initiated by the client, is an attack method of hijacking trusted users to send unexpected requests to the server XSS Si ...
Added by inkfish on Tue, 04 Jan 2022 11:17:00 +0200
SpringSecurity Filter CsrfFilter
CSRF (Cross-site request forgery), Chinese name: Cross-site request forgery, also known as one click attack/session riding, abbreviated as CSRF/XSRF.
You can understand CSRF attacks as follows: an attacker steals your identity and sends malicious requests on your behalf. CSRF can do things like send mail on your behalf, send messages, steal yo ...
Added by BinaryDragon on Mon, 03 Jan 2022 22:17:47 +0200
Geek peak 2021 web opcode
preface
After hitting the peak of geeks, talk about your feelings: it's really becoming more and more delicious?? They didn't sign in and didn't leave. They scored 0 directly, which was worse than when they first started
There are two Pwns, one five or six libc + two executable files. They don't bother to decompress them. A malloc direc ...
Added by deezerd on Sun, 02 Jan 2022 04:11:18 +0200