day55 network security
Firewall
Firewall function
In the computer field, firewall is a device used to protect information security. It will allow or restrict data transmission according to user-defined rules.
A device used to protect intranet securityProtection according to rulesUser defined rulesAllow or deny access to external users
Firewall classifica ...
Posted by offsprg01 on Sat, 09 Oct 2021 05:11:45 -0700
Security open source project
Collect some excellent safety open source projects of Party A
This is a list of open source security projects, which collects some excellent open source security projects to help Party A's security practitioners build enterprise security capabilities. Each of these open source projects is committed to solving some security problems.
Ideas for ...
Posted by yalag on Thu, 07 Oct 2021 22:07:59 -0700
CTF - light of dream
Light of dream
Game link: http://monyer.com/game/game1/
F12 view the page source code, click first.php and jump to the first level
Similarly, check the source code of the first level. The password is two spaces. Submit to the second level
function check(){
if(document.getElementById('txt').value==" "){
windo ...
Posted by amjohnno on Thu, 30 Sep 2021 15:10:34 -0700
Violent cracking of DVWA s
Catalog
low
medium
high
impossible
low
Source code:
<?php
if( isset( $_GET[ 'Login' ] ) ) {
// Get username
$user = $_GET[ 'username' ];
// Get password
$pass = $_GET[ 'password' ];
$pass = md5( $pass );
// Check the database
$query = "SELECT * FROM `users` WHERE user = '$user' AND password = '$pass';" ...
Posted by Bazzaah on Wed, 29 Sep 2021 09:14:12 -0700
[security tools] talking about writing Java code audit tools
introduce
The author is a senior student who is new to safety. If there are mistakes in the article, please point out!
At first, it was considered to use pure matching, but this method is too strict, and the code written by programmers has various possible combinations
Therefore, I tried to realize java lexical analysis and syntax analysis ...
Posted by tommyrulez on Mon, 27 Sep 2021 03:25:41 -0700
On batch mining of src vulnerabilities
preface This blog post only talks about vulnerability utilization and batch mining. Before contacting src, I had the same question with many masters, that is, how did those masters dig holes in batches? After climbing for two months, I gradually have my own understanding and experience, so I intend to share it and communicate with all masters. ...
Posted by LaWr3nCe on Thu, 23 Sep 2021 05:58:29 -0700
PHP deserialization vulnerability & netding cup ctf instance
Vulnerability profile
php deserialization vulnerability, also known as php object injection vulnerability.
In short, when php is deserialized, the content of the deserialization is under the control of the user, so the malicious user can construct the code of the specific serialized content, carry out the specific deserialization operation ...
Posted by karimali831 on Tue, 21 Sep 2021 20:48:13 -0700
Tips for writing exp
Tips for writing exp
1. Code alignment
When filling in the address in exp, pay attention to the filling of code length
2. Fill to specified length
3. Link the remote server or link the local file
# long-range
r = remote('objective IP Or target URL',Destination port number)
# local
r = process('./file name')
4. Format conversion
The ...
Posted by Johnain on Mon, 20 Sep 2021 16:52:57 -0700
Sqli labs customs clearance (less41~less50)
catalogue
Less41
Less42
Less43
Less44
Less45
Less46
Less47
Less48
Less49
Less50
Less41
This level is similar to Less40. First find the closure through Boolean blind injection, and then stack and inject recklessly.
Find closure:
http://192.168.101.16/sqli-labs-master/Less-41/?id=1 There are query results
http://192.168.10 ...
Posted by jaikar on Thu, 16 Sep 2021 13:44:57 -0700