The author focuses on the introduction of the creation process, which is also very important, learning the works of the master can be very good to improve our actual combat ability.Final effect
Since Alexander Graham Bell invented the telephone in 1875, people have wanted to record and retrieve calls. Although this basic desire has not changed, the reasons for recording and effectively retrieving calls are clearly different. Compared with
All boys and girls see the reason for the breakup
The girl finally summon up the courage to say to the boy: "Let's Break Up"The boy asked, "why." 」The girl said: "Tired, there is no need for reason."One nightThe boy only smokes and
1:64 Modeling guide-quarterly Publication catering to the S-scale model RailroaderAcadia Collectibles-online Store specializing in Model railroad magazine BackissuesAtlantic Northeast Rails Ports-newsletter about the railroads, Ports, intermodal facilities, and government of New England and Eastern Canada, published twice a month and archived onlineAustralian model Engineering magazine-bi-monthly
Information Detection:
Target Site: http://icfcs.xxxxx.jpServer IP: 210.166.xxx.76 (Japan)Environment platform: PHP/5.1.6Server System: Apache/2.2.3 (Red Hat)Open the home page of the website, open a link at will, and manually test whether the injection vulnerability exists. '(an error is returned), and The sqlmap test injection is still directly performed, the returned results confirm that the injection can be performed (manual injection is not available, I wonder if it is a personal technical
[Magazine name] Mechanical Science and Technology
[Journal articles include major] Theoretical Research and Design of Analysis Technology for computing institutions-equipment-material experiment research CAD/CAM/CAE
[Contribution contact] mst@nwpu.edu.cn
[Contribution fee] The article review fee is 100, the page fee is about 200-250, and the picture is charged separately (as if it were 10/sheet)
[Magazine l
developments in design, development and web-related areas, it's reasonable to read design/tech-related online-magazines. however, the choice is huge, and the quality of magazines isn't always as good as you 'd probably like it to be. therefore decent references can be extremely useful, special if you don't know where to start from.
If applicable to business, it is also suitable for online commerce. To keep abreast of the latest developments in design, development, and web-related fields, it is
From accidentally climbing the blog, it's easy to crack medusa with your handwriting. First, let's look at the help root @ perl-exploit: pentestexploitsframework3 # medusaMedusav1.5 [http: www.foofus.net] (C) JoMo-KunFoofusNetworksjmk@foofus.netALERT: Hosti
From accidentally climbing \ 'blog
It hurts, just click it, mEdUsa is still relatively fast to crack. First, let's look at the help
Root @ perl-exploit:/pentest/exploits/framework3 # meDuSaMedusa v
From the accidentally climax of ' blogEgg ache, write a bit, Medusa crack up still relatively fast, first we see Help[Email protected]:/pentest/exploits/framework3# MedusaMedusa v1.5 [http://www.foofus.net] (C) jomo-kun/foofus Networks Alert:host information must be supplied.Syntax:medusa [-H host|-h file] [-u username|-u file] [-P password|-p file] [-C file]-M module [OPT]-H [TEXT]: Target hostname or IP address-h [File]: file containing target hostn
locally, pointing to the/tmp directory. When wget sends the cwd command, it recursively enters the fakedir and sends the LIST command. In this case, a malicious file or
For example:
-rwx------ 1 root root 21 Aug 29 2013 pwned
When the RETR command downloads the pwned file, the returned file content (binary or text) is returned ). Attackers can fool arbitrary directory write on the wget client.
Specific exploitation Script: https://github.com/yaseng/pentest
BlindElephant is a Web Application Fingerprinter program. Of course, it is similar to WhatWeb. However, it seems that WhatWeb cannot scan the plug-in.
(Qualys security researcher Patrick Thomas discussed the open-source Web application fingerprint engine BlindElephant at the Black Hat conference. BlindElephant is a tool that helps security experts and System Administrators identify all operations on servers, including any Web applications downloaded by users. It does not detect a vulnerability,
Use of DNS scanning toolsDNS scanning tools can be used to collect information including: domain name registration information, domain name resolution server (DNS server), valid sub-domain names(Information that can be used to collect: domain name registration information, name, phone number, email address, expiration time, valid subdomain name ....)1. WhoisUsage: whois top-level domain name (must be top-level domain name)Domain name status:The server group used to resolve DNS:Domain Name and Ne
Plot Description:American soldier Anti-Han Yozo holding 5 magazines (5 bullets per magazine) with the brothers to fight a bullet and then call for helpClass:Soldiers:Property: Name (_name) height (_height) weight (_weight)Behavior: Shooting (fire) for help (CALLFORHELP)Gun:Property: Magazine (_clip) magazine qty (_clipnum) Brand (_model)Behavior: Change the
. Incorrect results at http://nmap.org/submit/.
Nmap done:1 IP Address (1 host up) scanned in 7.42 seconds server only open 80 ports, operating system is Linux 2.6.22 (Fedora Core 6)
Now that we've got all the important information, let's do a bit of vulnerability testing, such as SQL injection, blinds, LFI,RFI,XSS,CSRF, etc.
We use nikto.pl to get information and weaknesses:
[Email protected]:/pentest/web/nikto# perl nikto.pl-h http:/
Today, I want to learn how to install PostgreSQL8.4 in Ubuntu9.10. After executing the following command, linuxidc @ pentest :~ $ The sudoapt-getinstallpostgresql-8.4postgresql-client-8.4postgresql-contrib-8.4 returns the following: update-alternatives: Using/usr/share/postgresql
I want to install PostgreSQL 9.10 on Ubuntu 8.4 today. After executing the following command
Linuxidc @ pentest :~ $ Sudo apt-get
SCTF2016 the painful infiltration of the road
0x00 Preface
This time the CTF play very sour, a total of 7 web penetration of the topic, this is the beginning of pain. A good jury, for him so many high door threshold.
0x01 pentest-homework-200
http://homework.sctf.xctf.org.cn/
Open full, is the landing page, entered the registration. Name, age, upload pictures.
After landing, a picture was displayed. There's also a homework link.
Click Homework
1. The previous analysis of Main and Execve, with the "Basic Shellcode extraction method" in the corresponding part of the explanation.
If the EXECVE () call fails, the program will continue to fetch the instruction from the stack and execute it, while the data in the stack is random, usually the program will be core dump. If we want the program to still exit gracefully when the EXECVE () call fails, we must add an exit system call after the EXECVE () call. Its C language program is as follows:
Information Detection:
Target Site: http://www.sixxf.itServer IP Address: 192.232.2xx.97 (USA)Environment platform: PHPServer System: ApacheThis time, I used a webpage to detect that the information on this site is not complete. Go to the topic, open the website background, and enter a 'in the login account text. The returned result is as follows:After the execution of ', the SQL statement reports an error, indicating that there may be injection. Use the Sqlmap tool in the Back Track system to t
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.