A security vulnerability analysis

Vulnerability analysis The environment is built with vulhub. The version is Confluence Server 6.10.2 Widget Connector is a plug-in of Confluence. Compare the plug-ins before and after repair Left Confluence 6.13.0 right 6.13.3 widgetconnector-3.1.0.jar!\com\atlassian\confluence\extra\widgetconnector\WidgetMacro.class You can see that th ...

Added by romeo on Sat, 15 Jan 2022 02:27:52 +0200

File upload (11-19)

Today, I saw the source code of the shooting range uploaded by the file, all of which have flag files Looks like I lost a billion Simply put the source code on the small skin of the virtual machine (because the machine has a mysql environment, it is not willing to delete, but also useful) A new station was established with the help o ...

Added by celavi on Thu, 13 Jan 2022 15:59:23 +0200

High version jdk bypass of jndi injection in Java deserialization

The leaders in the group have fun. Take out the vegetable chicken, sort it out and study it, and fry some cold rice. It mainly includes the following three parts: jndi injection principle jndi injection and deserialization jndi injection and jdk version jndi injection principle: JNDI (Java name and Dictionary interface), a set of Java EE stan ...

Added by xconspirisist on Tue, 11 Jan 2022 13:17:44 +0200

Common network security terminology

1. Black hat A person who hacks for illegal purposes, usually for economic gain. They enter the secure network to destroy, redeem, modify or steal data, or make the network unavailable to authorized users. The name comes from the fact that villains in old-fashioned black-and-white western films are easy to be recognized by film viewers because ...

Added by GiaTuan on Sun, 09 Jan 2022 03:36:27 +0200

Domain penetration of three-layer network protection

Environmental preparation Network topology The network topology is as follows: Configure network card Since the address of the virtual machine has been written to death, problems are likely to occur if it is changed. Therefore, directly create two network cards vm18 and vm19, and specify the following subnet addresses For a web serve ...

Added by gdhanasekar on Fri, 07 Jan 2022 13:54:32 +0200

Cve-2021-45232 Apache APIs IX never authorized access to RCE

00x1 vulnerability environment Apache APIs IX dashboard version 2.7 - 2.10 is affected Build an environment in docker by pulling git git clone https://github.com/apache/apisix-docker   Note that you need to change the yml file to version 2.7     Then use docker to build it     00x2 attack process   After the environment runs, it successfully ...

Added by hobeau on Wed, 05 Jan 2022 16:47:35 +0200

Huxiang cup 2021 Pastebin recurrence learning

Huxiang cup 2021 Pastebin recurrence learning 1, Introduction to Service Worker Service Worker can be understood as a proxy server between the client and the server. When a Service Worker is registered in the website, it can intercept the request and judge whether to send the request to the server or directly return it to the client through t ...

Added by ashutosh.titan on Wed, 05 Jan 2022 16:08:44 +0200

Explanation of CSRF and SSRF vulnerability cases - day29

CSRF & SSRF] - explanation of vulnerability cases - day29 1, CSRF - Cross Site Request Forgery Attack 1. Explain CSRF vulnerability explanation, principle CSRF(Cross-site request forgery) Cross Site Request Forgery, initiated by the client, is an attack method of hijacking trusted users to send unexpected requests to the server XSS Si ...

Added by inkfish on Tue, 04 Jan 2022 11:17:00 +0200

SpringSecurity Filter CsrfFilter

CSRF (Cross-site request forgery), Chinese name: Cross-site request forgery, also known as one click attack/session riding, abbreviated as CSRF/XSRF. You can understand CSRF attacks as follows: an attacker steals your identity and sends malicious requests on your behalf. CSRF can do things like send mail on your behalf, send messages, steal yo ...

Added by BinaryDragon on Mon, 03 Jan 2022 22:17:47 +0200

Geek peak 2021 web opcode

preface After hitting the peak of geeks, talk about your feelings: it's really becoming more and more delicious?? They didn't sign in and didn't leave. They scored 0 directly, which was worse than when they first started There are two Pwns, one five or six libc + two executable files. They don't bother to decompress them. A malloc direc ...

Added by deezerd on Sun, 02 Jan 2022 04:11:18 +0200