PWN entry series stack overflow

PWN entry series (2) Stack overflow Stack overflow means that the number of bytes written by the program to a variable in the stack exceeds the number of bytes applied by the variable itself, resulting in the value of the variable in the adjacent stack being changed (overwritten). It is a specific buffer overflow vulnerability, similar to hea ...

Posted by NINTHTJ on Thu, 02 Dec 2021 10:39:48 -0800

java_ Command execution

java_ Command execution Runtime class analysis First look at the demo of a command execution, as follows import java.io.ByteArrayOutputStream; import java.io.IOException; import java.io.InputStream; public class RuntimeTest { public static void main(String[] args) throws IOException { Runtime runtime = Runtime.getRuntime(); ...

Posted by ade1982 on Sun, 28 Nov 2021 09:11:30 -0800

kubernetes based on jenkins spinnaker's ci/cd practice - adding product image scanning

preface:Early jenkins assumed all the functions of ci/cd in kubernetes Jenkins Pipeline evolution , we are going to split the cd continuous integration into spinnaker!Of course, the normal idea should be to get through the user account of jenkins spinnaker and integrate ldap.spinnaker account system. Relevant experiments have been done before i ...

Posted by Poolie on Sat, 20 Nov 2021 16:26:57 -0800

[security vulnerability] rdecms-5.8.1 SSTI template injection leads to RCE

Vulnerability type SSTI RCE Utilization conditions Scope of influence application Vulnerability overview On September 30, 2021, Steven Seeley, a foreign security researcher, disclosed an SQL injection vulnerability and an RCE vulnerability caused by SSTI in the latest DedeCMS version. Because the utilization conditions of SQL injection vul ...

Posted by gacon on Sat, 20 Nov 2021 06:57:18 -0800

New section of PE document

catalogue What values in the PE file will be affected by the new section? To add a new section: Add section manually Code new section If you need to build a shellcode at one end in the PE file (when the remaining space in the default section area is insufficient), you can solve this problem by adding a section. Usually, most shelling soft ...

Posted by mastermike707 on Thu, 28 Oct 2021 05:27:54 -0700

Take you to master java deserialization vulnerabilities and their detection

Absrtact: This paper will first introduce the principle of java deserialization vulnerability, and then introduce how security tools detect and scan such vulnerabilities. This article is shared from Huawei cloud community< java deserialization vulnerability and its detection >, author: alpha1e0. 1 Introduction to Java deserialization ...

Posted by DuNuNuBatman on Tue, 19 Oct 2021 18:22:07 -0700

Safety course design experiment

Experiment 1: brute force cracking Specific requirements: break the login point of the specified IP environment. A. IP address can be specified; B. The number of threads required for scanning can be set; C. Analyze the burst result and its principle, and show the corresponding process. 0x01 low difficulty: Log in to dvwa range Reset d ...

Posted by arun4444 on Tue, 12 Oct 2021 11:11:57 -0700