自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(27)
  • 收藏
  • 关注

原创 zimbra10.1.4补丁分析

zimbra近期更新了10.1.4补丁,对其中的三个安全问题进行了分析,供大家一起来学习安全,提升自己的安全开发意识。

2024-12-24 10:42:53 626

原创 hackmyvm: logan2

browse port 80, find a sql injection.using sqlmap, we got a new domain: add the domain to the hosts, and visit. from the comments, it can be seen that there is a file inclusion.use this file inclusion and apache2’s log file, we can exec phpinfo(but ex

2023-10-10 19:35:39 309

原创 高版本jdk下jetty servlet型内存马编写

高版本下jetty内存马编写的过程中,获取webappcontext对象出现了一些差异。本文通过跟踪处理流程,解决了高版本jdk条件下非嵌入式环境webappcontext获取的问题,成功实现了servlet型内存马的添加。通过这次学习,了解了java内存马的原理和实现,丰富了自己的知识面。...

2022-07-25 10:41:57 2152

原创 hackmyvm: juggling walkthrough

hackmyvm: juggling, md5 0e problem, php weak typing

2022-07-25 09:58:55 999

原创 hackmyvm: kitty walkthrough

一个稍微有点难的训练

2022-06-27 17:33:15 617

原创 hackmyvm: controller walkthrough

1. get first reverse shellvisit port 80, from the page http://192.168.85.135/index.php/2021/06/27/hola-mundo/ we get hint.use enum4linux to get samba shares, the we get the directory tester which we can visit without user and passwd.follow the hint

2021-10-13 14:05:06 452 3

原创 hackmyvm: again walkthrough

1. 命令执行获取shellPORT STATE SERVICE22/tcp open ssh80/tcp open http访问web,获得用户名和提示。下载 upload.bck.<?phpif (!isset($_FILES["myFile"])) { die("There is no file to upload.");}$filepath = $_FILES['myFile']['tmp_name'];$fileSize = filesize($fi

2021-10-12 11:33:18 288

原创 hackmyvm-random walkthrough

1. get reverse shellPORT STATE SERVICE21/tcp open ftp22/tcp open ssh80/tcp open httpbrowse port 80, get the user name eleanor and alan.crack ftp service, get the user eleanor's password.use sftp login as eleanor , get into the path /html and

2021-10-03 21:36:51 360

原创 VIKINGS: 1 vulnhub walkthrough

虚拟机地址 : https://www.vulnhub.com/entry/vikings-1,741/infomationPORT STATE SERVICE22/tcp open ssh80/tcp open http访问web。对目录site进行目录和文件爆破,发现了war.txt。➜ vikings gobuster dir -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u http://

2021-09-16 22:45:57 1725

原创 DarkHole: 2 vulnhub walkthrough

主机和端口发现:➜ ~ nmap -sn 192.168.143.0/24Host is up (0.00010s latency).Nmap scan report for 192.168.143.206➜ ~ nmap -T4 -v -p- 192.168.143.206PORT STATE SERVICE22/tcp open ssh80/tcp open http访问web服务,有一个登录页面:尝试注入失败,于是dirb爆破一下目录:发现了git目录,于是使用

2021-09-08 21:02:12 591

原创 hackmyvm: may walkthrough

hackmyvm: may walkthrough信息收集访问80,会跳转到域名may.hmv访问,这里需添加hosts访问。得到了一个用户明marie。爆破目录未果,于是爆破vhost。找到两个vhost,portal和ssh。添加hosts后访问portal.may.hmv。这个一个登录页面,会验证用户名和密码,尝试注入失败后,利用前面得到的用户名尝试爆破密码。得到密码rebelde并成功获取到了cookie,将这个cookie注入到http://ssh.may.hmv/check.

2021-08-12 13:42:29 507

原创 hackmyvm-bunny walkthrough

hackmyvm-buny walkthrough难度(作者评价):difficult信息收集PORT STATE SERVICE22/tcp open ssh80/tcp open http获取shell端口信息很少,常规操作,访问80,爆破目录。upload.php,password.txt,config.php都是没有实际含义的文本文件。phpinfo.php泄露了主机的相关信息。能想到的就是index.php是不是存在ssrf。于是利用ffuf对index.php进

2021-08-09 15:49:03 229

原创 hackmyvm-hopper walkthrough

hackmyvm: hopper信息收集到获取第一个shellPORT STATE SERVICE22/tcp open ssh80/tcp open http全端口扫描,先访问一下web服务。利用gobuster扫描目录找到目录advanced-search,这里存在ssrf。虚拟机有三个用户可以bash登录,root,edward,henry。经过简单测试,不能进行远程文件包含,估计是调用的curl_exec,关于php的ssrf利用一般情况下可以参看SSRF in PH

2021-08-05 22:38:43 401 1

原创 MOMENTUM: 2 vulnhub walkthrough

信息Momentum2.ova (Size: 698 MB)Download (Mirror): https://download.vulnhub.com/momentum/Momentum2.ovaDownload (Torrent): https://download.vulnhub.com/momentum/Momentum2.ova.torrent ( Magnet)端口扫描和目录扫描PORT STATE SERVICE22/tcp open ssh80/tcp open

2021-07-19 21:09:47 432 2

原创 Orasi: 1 vulnhub walkthrough

下载地址:http://www.vulnhub.com/entry/orasi-1,660/Hint :just one useless little dot0x01 信息收集到获取shell端口扫描:使用anonymous访问ftp,获取到一个文件:url。该文件为一个共享连接库。先看看main函数:于是将insert中的每一个字符转换为acsii码,得到一串字符/sh4d0w$s,看起来像是url。访问80端口,得到一串奇怪的字符,看着有点像口令字典工具crunch的参数,等一下还有用。

2021-03-11 16:59:33 1527

原创 Alfa: 1 vulnhub walkthrough

信息页:http://www.vulnhub.com/entry/alfa-1,655/关键字:Enumeration | Web Application | Brute Force | Privilege Escalation0x01 端口扫描PORT STATE SERVICE21/tcp open ftp80/tcp open http139/tcp open netbios-ssn445/tcp open microsoft-ds65111/tc

2021-03-10 11:46:37 482

原创 Phonebook

Phonebook新的改变我们对Markdown编辑器进行了一些功能拓展与语法支持,除了标准的Markdown编辑器功能,我们增加了如下几点新功能,帮助你用它写博客:全新的界面设计 ,将会带来全新的写作体验;在创作中心设置你喜爱的代码高亮样式,Markdown 将代码片显示选择的高亮样式 进行展示;增加了 图片拖拽 功能,你可以将本地的图片直接拖拽到编辑区域直接展示;全新的 KaTeX数学公式 语法;增加了支持甘特图的mermaid语法1 功能;增加了 多屏幕编辑 Markdown文章功能

2021-01-08 16:49:09 219

原创 Warzone: 3 (Exogen) vulnhub walkthrough

Warzone: 3 (Exogen)vulnhub地址:http://www.vulnhub.com/entry/warzone-3-exogen,606/0x01 信息收集到获取shellPORT STATE SERVICE VERSION21/tcp open ftp vsftpd 3.0.322/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)4444/tcp op

2020-12-03 21:29:12 932

原创 Shuriken: 1 vulnhub walkthrough

Shuriken: 1vulnhub地址:http://www.vulnhub.com/entry/shuriken-1,600/0x01 信息收集到获取shell服务器只开放了80端口,dirb爬取目录。==> DIRECTORY: http://192.168.56.121/css/ ==> DIRECTORY: http://192.168.56.121/img/

2020-12-03 13:46:11 1259

原创 Masashi: 1 vulnhub walkthrough

Masashi: 1虚拟机信息:http://www.vulnhub.com/entry/masashi-1,599/0x01. 信息收集获取shellPORT STATE SERVICE VERSION22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)80/tcp open http Apache httpd 2.4.38 ((Debian))tcp端口只开放了22和80,访问80为apache

2020-12-02 10:39:16 381 1

原创 Praying: 1 vulnhub walkthrough

Praying: 1虚拟机信息:http://www.vulnhub.com/entry/praying-1,575/1. 获取shell80/tcp open http Apache httpd 2.4.41 ((Ubuntu))服务器只开放了80端口,访问后为apache默认页面,于是用dirb跑了一下目录,发现了admin目录。==> DIRECTORY: http://192.168.56.105/admin/发现后发现为mantis的登陆页面测

2020-11-26 21:54:27 435

原创 GreenOptic: 1 vulnhub walkthrough

GreenOptic: 1下载地址:http://www.vulnhub.com/entry/greenoptic-1,510/1. 端口扫描开放端口信息,系统为centos7。PORT STATE SERVICE VERSION21/tcp open ftp vsftpd 3.0.222/tcp open ssh OpenSSH 7.4 (protocol 2.0)53/tcp open domain ISC BIND 9.11.4-P2

2020-11-24 21:09:55 798

原创 Warzone: 2 vulnhub walkthrough

Warzone: 2下载地址: http://www.vulnhub.com/entry/warzone-2,598/获取shell端口扫描结果:PORT STATE SERVICE VERSION21/tcp open ftp vsftpd 3.0.322/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)1337/tcp open tcpwrapped使用anon

2020-11-16 15:39:27 582

原创 SECARMY VILLAGE: GRAYHAT CONFERENCE vulnhub walkthrough

SECARMY VILLAGE: GRAYHAT CONFERENCE虚拟机地址:https://download.vulnhub.com/secarmyvillage/SECARMY-VILLAGE-OSCP-GIVEAWAY.ova主机探测、端口扫描这里就省略了,每次都写显得冗余了。flag1访问80端口,没有什么有价值信息,先dirb跑一下目录---- Scanning URL: http://192.168.132.141/ ----==> DIRECTORY: http://19

2020-11-14 23:10:04 2343

原创 Money Heist: 1 vulnhub walkthrough

Money Heist: 1虚拟机页面:http://www.vulnhub.com/entry/money-heist-1,592/Description“The Professor” has a plan to pull off the biggest heist in recorded history – to print billions of Flags . To help him carry out the ambitious plan, he recruits eight people

2020-10-30 22:31:09 747

原创 Warzone: 1 vulnhub walkthrough

Warzone: 1虚拟机页面:http://www.vulnhub.com/entry/warzone-1,589/DescriptionInfo : Created and Tested in Virtual Box, maybe you need to write codeBased on : CryptoScenario : You are trying to gain access to the enemy systemMission : Your mission is to ge

2020-10-27 13:45:49 1021

原创 IA: Nemesis (1.0.1) vulnhub walkthrough

文章目录IA: Nemesis (1.0.1)服务探测web渗透测试获取第二个flag提权至root获取第三个flag参考IA: Nemesis (1.0.1)虚拟机页面:http://www.vulnhub.com/entry/ia-nemesis-101,582/DescriptionDifficulty: Intermediate to HardGoal: Get the root shell and read all the 3 flags.Information: You need

2020-10-27 13:37:55 2183 1

飞塔防火墙fortigate7.4.5 vm虚拟镜像下载

飞塔防火墙fortigate7.4.5 vm虚拟镜像下载

2025-01-02

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除