[WEB security] PHPMyAdmin background GetShell posture summary

preface: phpMyAdmin is a MySQL database management tool based on PHP and built on the server in Web mode. It enables managers to manage MySQL database through web interface. Because of its simple and easy to operate graphical interface based on Web, it is loved by website managers. When we get the MySQL account and password through other ...

Added by jasonok6 on Sat, 01 Jan 2022 03:48:11 +0200

Secondary injection of SQL injection

catalogue 1. Principle Secondary injection process 2. Experimental process (1) View initial users table (2) Registered user (3) Modify user password 3. Cause   Specific code 4. Defensive measures 1. Principle Secondary injection can be understood as the injection caused by the malicious data constructed by the attacker being st ...

Added by urgido on Thu, 30 Dec 2021 21:11:53 +0200

FastJson<=1.2.24 JdbcRowSetImpl uses chain analysis

preface The above analyzes the TemplatesImpl utilization chain, analyzes the fastjson parseObject function, understands the whole process of triggering vulnerabilities, and then comes to learn the JdbcRowSetImpl utilization chain. The utilization chain of JdbcRowSetImpl is widely used in practice. There are basically no restrictions on this cha ...

Added by SCRUBBIE1 on Thu, 30 Dec 2021 06:11:17 +0200

[pwn learning] format character vulnerability

What is a format character vulnerability The format string function can accept a variable number of parameters, take the first parameter as the format string, and parse the parameters according to it. Generally speaking, the format string function is to convert the data represented in computer memory into a human readable string format. Al ...

Added by jiayanhuang on Wed, 29 Dec 2021 18:52:22 +0200

Reverse series | AES reverse encryption case analysis

AES encryption details Introduction: the full name is advanced encryption standard (English Name: Advanced Encryption Standard), also known as Rijndael encryption method in cryptography, which is sponsored by the National Institute of standards and technology of the United States (NIST) was released in 2001 and became an effective standard in ...

Added by WiseGuy on Wed, 29 Dec 2021 17:15:47 +0200

ATT&CK red team evaluation actual combat range-1 (the smallest in the whole network)

Statement: the series is first official account: Xuan Xuan is safe, please indicate the source of the reprint. The contents of this official account are only used for technical discussions among network fans. All penetration and use of tools need authorization, and no use of illegal channels. Otherwise, the official account and author will not ...

Added by Seol on Sat, 25 Dec 2021 12:05:41 +0200

Part of the first "Hecheng Cup" Henan Hebi CTF network security challenge

The first "Hecheng Cup" Henan Hebi CTF network security challenge Official account: Th0r security 1 $ tshark -r timu.pcapng http|grep ' GET ' > timu-get $ for i in `seq 1 30`; do a=`grep "),$i,1)" timu-get|tail -1|cut -d= -f3|cut - d- -f1`;b=`printf "%x" $a`;echo -n $b; done 666c61677b77317265736841524b5f657a5f31736e74697 ...

Added by chadu on Sat, 25 Dec 2021 04:47:16 +0200

New upload labs 1-19 customs clearance ideas

upload.test Pass-01 Delete the check method return checkFile(). If the browser does not allow you to modify the front-end code, use the packet capture tool to modify it Then upload a sentence Pass-02 Back end verification content type Change the typege to image/jpeg Pass-03 php:: D ...

Added by karq on Fri, 24 Dec 2021 07:23:00 +0200

CORS vulnerability detection and utilization

CORS vulnerability detection and utilization Cross origin resource sharing, the full name of CORS, is a new feature of HTML5. It has been supported by all browsers. Unlike the old jsonp, it can only get requests. Detection method: 1.curl visit the website curl https://www.junsec.com -H "Origin: https://test.com" -I Check whether the acces ...

Added by YOUAREtehSCENE on Fri, 17 Dec 2021 11:22:00 +0200

Reinforcement method of Android APK

Where there are people, there is competition. The development of Android is accompanied by the development of reverse and secure reinforcement. Reverse workers can accelerate the speed of reverse through some very easy-to-use software, such as IDA, JEB, etc; Application developers will also use various means to prevent reverse workers from reve ...

Added by diesel on Wed, 15 Dec 2021 00:01:49 +0200