路由器漏洞挖掘之 DIR-805L 越权文件读取漏洞分析 - H4lo H4lo 6 years 9 months ago 接下来的文章都会实战复现一些关于路由器的 web /二进制漏洞,可能会写的比较细,希望能给大家带来启发。 若这里图片显示不出来可以试试挂个梯子 。 前言 本文在复现 DIR 805L 任意文件读取漏洞时,将会比较详细的分析一下用于 cgi 处理的 函数其中的一些功能。在逆向 二进制文件时,常常会遇到 H4lo
Ramnit Returns to its Banking Roots, Just in Time for Italian Tax Season F5 Labs 6 years 9 months ago Ramnit’s latest configuration targets Europe leading up to tax season, focusing on Italian banks and international online advertisers.
Ramnit Returns to its Banking Roots, Just in Time for Italian Tax Season F5 Labs 6 years 9 months ago Ramnit’s latest configuration targets Europe leading up to tax season, focusing on Italian banks and international online advertisers.
CISCN 2019 writeup - Vicen Vicen 6 years 9 months ago 划水做了两个pwn和两个逆向...... 二进制题目备份 Re easyGO Go语言,输入有Please字样,ida搜索sequence of bytes搜please的hex值找到字符串变量,交叉引用查到主函数是sub_495150,IDA断点动态调试发现直接出现了flag...... bbvv Vicen
XSS实战 跳转XSS Posts on 青鸟的博客 6 years 9 months ago XSS实战: 跳转XSS 前言 跳转XSS实际上并不是一种新类型的攻击方式, 主要形成原因是 以前网站外部跳转时是直接接受参数然后跳转,导致了URL重
2019DDCTF 部分我解决的题目writeup Hurricane618(风之栖息地) 6 years 9 months ago 我得说DDCTF真的是脑洞太大,一言难尽。。。 滴~文件包含,需要一些转换。转成hex值之后两次base64。 hurricane618
DDCTF 2019 部分WP - 淚笑 淚笑 6 years 9 months ago WEB 滴~ http://117.51.150.246/index.php?jpg=TmpZMlF6WXhOamN5UlRaQk56QTJOdz09 观察链接可发现jpg的值是文件名转hex再base64编码两次得到,由此得到任意文件读取漏洞 读取index.php http://117.51.1 淚笑
CVE-2019-11243 Kubernetes Official CVE Feed 6 years 9 months ago rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig()
If I Had to Do It Over Again, Part 3 F5 Labs 6 years 9 months ago More stories from CISOs who describe how they would “do it over” again in some of their early security program deployments.
If I Had To Do It Over Again, Part 3 F5 Labs 6 years 9 months ago More stories from CISOs who describe how they would “do it over” again in some of their early security program deployments.