java_ Command execution
java_ Command execution
Runtime class analysis
First look at the demo of a command execution, as follows
import java.io.ByteArrayOutputStream;
import java.io.IOException;
import java.io.InputStream;
public class RuntimeTest {
public static void main(String[] args) throws IOException {
Runtime runtime = Runtime.getRuntime();
...
Posted by ade1982 on Sun, 28 Nov 2021 09:11:30 -0800
PHP deserialization
1, Pre knowledge
1. Basic concepts
A class definition starts with the keyword class, followed by the name of the class. The body of a class is contained in a pair of curly braces, which contain the definition of class properties and methods.
Class attributes exist in the data segment and class methods exist in the code segment. For a class, cla ...
Posted by vandana on Thu, 25 Nov 2021 22:38:51 -0800
[security vulnerability] rdecms-5.8.1 SSTI template injection leads to RCE
Vulnerability type
SSTI RCE
Utilization conditions
Scope of influence application
Vulnerability overview
On September 30, 2021, Steven Seeley, a foreign security researcher, disclosed an SQL injection vulnerability and an RCE vulnerability caused by SSTI in the latest DedeCMS version. Because the utilization conditions of SQL injection vul ...
Posted by gacon on Sat, 20 Nov 2021 06:57:18 -0800
Ctfshow web getting started - command execution
web29
The source code is:
<?php
/*
# -*- coding: utf-8 -*-
# @Author: h1xa
# @Date: 2020-09-04 00:12:34
# @Last Modified by: h1xa
# @Last Modified time: 2020-09-04 00:26:48
# @email: h1xa@ctfer.com
# @link: https://ctfer.com
*/
error_reporting(0);
if(isset($_GET['c'])){
$c = $_GET['c'];
if(!preg_match("/flag/i", $c)){
...
Posted by designxperts on Fri, 12 Nov 2021 11:56:51 -0800
src vulnerability Type Summary
This article is reproduced in https://blog.csdn.net/qq_33942040/article/details/111831536
These three types of vulnerabilities may be greater
The uglier the station, the more likely there is a hole.
Asp aspx The possibility of vulnerabilities is greater
There may be no verification code at the landing port
1, Unauthorized access
There ...
Posted by Sassci on Wed, 10 Nov 2021 07:30:08 -0800
Oracle SQL injection summary
0x00 Oracle Foundation
Oracle basic usage
What is an Oracle database?
Oracle is currently one of the largest software providers in the world, alongside Microsoft and Adode. With the development of Oracle, it has become one of the largest software providers of enterprise office platform.
Oracle database is the core product of Oracle (Chine ...
Posted by stormcloud on Mon, 08 Nov 2021 16:28:12 -0800
Webshell one sentence Trojan horse
Introduction to Webshell
What is a WebShell
webshell is a command execution environment in the form of web page files such as asp, php, jsp or cgj, which can also be called a web page back door
Because Web shell mostly appears in the form of dynamic script, it is also called the back door tool of the website
Attackers can use webshell t ...
Posted by a1ias on Sat, 06 Nov 2021 06:17:05 -0700
OSSIM open source security information management system
2021SC@SDUSC
1, Web part source code analysis
1. Brief description
The most users contact the OSSIM platform is the Web UI. They can easily obtain various security analysis charts through the web. As ordinary operation and maintenance personnel or monitoring personnel, most operations are completed through the Web UI.
The Web UI interface ...
Posted by lordrt on Fri, 08 Oct 2021 02:49:51 -0700
"CTF Web replication" BUUCTF-[EIS 2019]EzPOP
Utilization point
base64 + filter protocol bypasses death exit
Source code
<?php
error_reporting(0);
class A {
protected $store;
protected $key;
protected $expire;
public function __construct($store, $key = 'flysystem', $expire = null) {
$this->key = $key;
$this->store = $store;
$this ...
Posted by greenie2600 on Thu, 07 Oct 2021 08:22:52 -0700
PHP deserialization vulnerability & netding cup ctf instance
Vulnerability profile
php deserialization vulnerability, also known as php object injection vulnerability.
In short, when php is deserialized, the content of the deserialization is under the control of the user, so the malicious user can construct the code of the specific serialized content, carry out the specific deserialization operation ...
Posted by karimali831 on Tue, 21 Sep 2021 20:48:13 -0700