当前位置:网站首页>Xiaodi notes
Xiaodi notes
2022-07-03 02:35:00 【H0ne】
kitchen knife , Ant sword , Advantages and disadvantages of ice scorpion
kitchen knife : Status not updated , No plug-ins , Single encrypted transmission
Ant sword : Update status , There are plug-ins , Strong expansion , Single encrypted transmission
Ice scorpion : Update status , Unknown plugin , Two way encrypted transmission . Strong expansion , Applicable post penetration .
Idea of vulnerability mining
Fixed point mining keywords :
Controllable variable
Variables accept get post Accept keywords $_GET
Specific functions
Output print
Database operation
Specific keywords :
select,insert,update,sql Execute statement ==sql Inject holes
Search for specific keywords and try to find specific vulnerabilities
Such as : Search for echo,print What you're trying to dig is XSS Loophole
Such as : Search for $_GET $_POST, What I'm trying to dig is security vulnerabilities
Fixed point mining function point :
Such as : I want to mine files to upload , There is an operation address for uploading files in the member center , Packet capture analysis finds specific file code segments in the source code , File upload code analysis and mining ,
expand : Depending on the vulnerability
sql Inject , Database monitoring - Monitor the interaction between the current page and the database (sql Execute statement )
Breakpoint debugging : Visit the corresponding code of the page for breakpoint debugging ( The sequence of the execution process , Call file list, etc ).
Registered users :insert xiaodi union select’
Filter :xiaodi union select’
Access to database :xiaodi union select’
Modify the user :update xiaodi union select’ Conditions = Who is the user name ,xiaodi’ union select update Inject
The principle of secondary injection : Bypass escape injection , Magic quotes 、
Upload files :
# Keyword search :( function , Key word , Global variables, etc )
Upload files $_files move_uploaded_file etc.
# Application function capture :( Any application function point that may have upload )
Front desk member center , There may be upload places such as background news addition
Knowledge point
Elevated privileges :
webshell(
backstage : The function point ( Upload files , Template modification ,SQL perform , The data backup ) Thinking point ( Known procedures , Unknown program )
Loophole : Single point vulnerability ( Upload files , File contains ,RCE perform ,SQL Inject ...) Combined vulnerabilities ( Cooperation in all aspects )
The third party ( compiler , Middleware platform ,PHPadmin
Other permissions ( database (mysql,mssql,oracle...)
( The server FTP RDP SSH…)
Third party interface ( mail , payment , Space quotient …)
Server system
windows( For environment :web Local )
( The way to claim rights : database , Overflow vulnerability , Token stealing , Third party software ,AT&SC&PS, Unsafe service permissions , Service path without quotes ,Unattended installs,AlwayssiinstallElevated)
( For version :windows XP,windows 7/8/10,windows2ks/o8,windows2012/16
Intranet
Working group : Family, for example , dormitory Small LAN
Domain environment : There will be a computer to control , School computer room . Belongs to the upgraded version of the working group
Working group :ARP cheating ,DNS end
Domain environment :
DC domain controller : The highest permission of the domain ,
ipconfig /all Determine the domain of existence -dns
net view /admin Determine the domain of existence
net time /domain Determine the primary domain
Emergency response :
Protection phase , analysis phase , Recurrence stage , Repair phase , Proposal stage ,
Purpose : Analyze the attack time , Attack operations , The consequences of the attack , Safe repair, etc. and give reasonable solutions ,
Essential knowledge :
Be familiar with the common web Security attack technology
Be familiar with log activation, storage, viewing, etc
Be familiar with the classification and analysis of data recorded in logs
边栏推荐
- GBase 8c系统表-pg_conversion
- Awk from entry to burial (1) awk first meeting
- 【 tutoriel】 Chrome ferme les cors et les messages de la politique inter - domaines et apporte des cookies à travers les domaines
- Error invalid bound statement (not found): com ruoyi. stock. mapper. StockDetailMapper. XXXX solution
- Gbase 8C system table PG_ am
- Thread safe singleton mode
- [translation] modern application load balancing with centralized control plane
- Baidu map - surrounding search
- Cancellation of collaboration in kotlin, side effects of cancellation and overtime tasks
- MATLAB小技巧(24)RBF,GRNN,PNN-神经网络
猜你喜欢
[translation] the background project has joined the CNCF incubator
Matlab tips (24) RBF, GRNN, PNN neural network
Restcloud ETL cross database data aggregation operation
Pytorch convolution network regularization dropblock
【ROS进阶篇】第六讲 ROS中的录制与回放(rosbag)
【Flutter】shared_ Preferences local storage (introduction | install the shared_preferences plug-in | use the shared_preferences process)
SPI机制
Oauth2.0 authentication, login and access "/oauth/token", how to get the value of request header authorization (basictoken)???
Detailed analysis of micro service component sentinel (hystrix)
Job object of collaboration in kotlin
随机推荐
Cancellation of collaboration in kotlin, side effects of cancellation and overtime tasks
【教程】chrome關閉跨域策略cors、samesite,跨域帶上cookie
"Analysis of 43 cases of MATLAB neural network": Chapter 43 efficient programming skills of neural network -- Discussion Based on the characteristics of the new version of MATLAB r2012b
Gbase 8C trigger (II)
Classes and objects - initialization and cleanup of objects - constructor call rules
RestCloud ETL 跨库数据聚合运算
Mathematical statistics -- Sampling and sampling distribution
Gbase 8C function / stored procedure parameters (I)
Summary of interview project technology stack
awk从入门到入土(3)awk内置函数printf和print实现格式化打印
GBase 8c系统表-pg_constraint
xiaodi-笔记
面试八股文整理版
MATLAB小技巧(24)RBF,GRNN,PNN-神经网络
Gbase 8C create user / role example 2
require.context
GBase 8c系统表pg_database
4. 类和对象
Create + register sub apps_ Define routes, global routes and sub routes
Gbase 8C function / stored procedure parameters (II)