当前位置:网站首页>Xiaodi notes
Xiaodi notes
2022-07-03 02:35:00 【H0ne】
kitchen knife , Ant sword , Advantages and disadvantages of ice scorpion
kitchen knife : Status not updated , No plug-ins , Single encrypted transmission
Ant sword : Update status , There are plug-ins , Strong expansion , Single encrypted transmission
Ice scorpion : Update status , Unknown plugin , Two way encrypted transmission . Strong expansion , Applicable post penetration .
Idea of vulnerability mining
Fixed point mining keywords :
Controllable variable
Variables accept get post Accept keywords $_GET
Specific functions
Output print
Database operation
Specific keywords :
select,insert,update,sql Execute statement ==sql Inject holes
Search for specific keywords and try to find specific vulnerabilities
Such as : Search for echo,print What you're trying to dig is XSS Loophole
Such as : Search for $_GET $_POST, What I'm trying to dig is security vulnerabilities
Fixed point mining function point :
Such as : I want to mine files to upload , There is an operation address for uploading files in the member center , Packet capture analysis finds specific file code segments in the source code , File upload code analysis and mining ,
expand : Depending on the vulnerability
sql Inject , Database monitoring - Monitor the interaction between the current page and the database (sql Execute statement )
Breakpoint debugging : Visit the corresponding code of the page for breakpoint debugging ( The sequence of the execution process , Call file list, etc ).
Registered users :insert xiaodi union select’
Filter :xiaodi union select’
Access to database :xiaodi union select’
Modify the user :update xiaodi union select’ Conditions = Who is the user name ,xiaodi’ union select update Inject
The principle of secondary injection : Bypass escape injection , Magic quotes 、
Upload files :
# Keyword search :( function , Key word , Global variables, etc )
Upload files $_files move_uploaded_file etc.
# Application function capture :( Any application function point that may have upload )
Front desk member center , There may be upload places such as background news addition
Knowledge point
Elevated privileges :
webshell(
backstage : The function point ( Upload files , Template modification ,SQL perform , The data backup ) Thinking point ( Known procedures , Unknown program )
Loophole : Single point vulnerability ( Upload files , File contains ,RCE perform ,SQL Inject ...) Combined vulnerabilities ( Cooperation in all aspects )
The third party ( compiler , Middleware platform ,PHPadmin
Other permissions ( database (mysql,mssql,oracle...)
( The server FTP RDP SSH…)
Third party interface ( mail , payment , Space quotient …)
Server system
windows( For environment :web Local )
( The way to claim rights : database , Overflow vulnerability , Token stealing , Third party software ,AT&SC&PS, Unsafe service permissions , Service path without quotes ,Unattended installs,AlwayssiinstallElevated)
( For version :windows XP,windows 7/8/10,windows2ks/o8,windows2012/16
Intranet
Working group : Family, for example , dormitory Small LAN
Domain environment : There will be a computer to control , School computer room . Belongs to the upgraded version of the working group
Working group :ARP cheating ,DNS end
Domain environment :
DC domain controller : The highest permission of the domain ,
ipconfig /all Determine the domain of existence -dns
net view /admin Determine the domain of existence
net time /domain Determine the primary domain
Emergency response :
Protection phase , analysis phase , Recurrence stage , Repair phase , Proposal stage ,
Purpose : Analyze the attack time , Attack operations , The consequences of the attack , Safe repair, etc. and give reasonable solutions ,
Essential knowledge :
Be familiar with the common web Security attack technology
Be familiar with log activation, storage, viewing, etc
Be familiar with the classification and analysis of data recorded in logs
边栏推荐
- Memory pool (understand the process of new developing space from the perspective of kernel)
- Awk from entry to burial (1) awk first meeting
- 内存池(内核角度理解new开辟空间的过程)
- Pytorch convolution network regularization dropblock
- Why choose a frame? What frame to choose
- 《MATLAB 神经网络43个案例分析》:第43章 神经网络高效编程技巧——基于MATLAB R2012b新版本特性的探讨
- RestCloud ETL 跨库数据聚合运算
- [translation] modern application load balancing with centralized control plane
- Job object of collaboration in kotlin
- random shuffle注意
猜你喜欢
xiaodi-笔记
Mathematical statistics -- Sampling and sampling distribution
《MATLAB 神经网络43个案例分析》:第43章 神经网络高效编程技巧——基于MATLAB R2012b新版本特性的探讨
Baidu map - surrounding search
怎么将yolov5中的PANet层改为BiFPN
[shutter] banner carousel component (shutter_wiper plug-in | swiper component)
4. 类和对象
sql server数据库添加 mdf数据库文件,遇到的报错
内存池(内核角度理解new开辟空间的过程)
Choose it when you decide
随机推荐
[translation] flux is safe. Gain more confidence through fuzzy processing
Why choose a frame? What frame to choose
Coroutinecontext in kotlin
COM和CN
怎么将yolov5中的PANet层改为BiFPN
4. 类和对象
GBase 8c系统表-pg_aggregate
[shutter] banner carousel component (shutter_wiper plug-in | swiper component)
Random Shuffle attention
内存池(内核角度理解new开辟空间的过程)
sql server数据库添加 mdf数据库文件,遇到的报错
GBase 8c系统表-pg_collation
Linear rectification function relu and its variants in deep learning activation function
错误Invalid bound statement (not found): com.ruoyi.stock.mapper.StockDetailMapper.xxxx解决
搭建私有云盘 cloudreve
MUX VLAN Foundation
Mathematical statistics -- Sampling and sampling distribution
JS的装箱和拆箱
Simple understanding of SVG
【教程】chrome關閉跨域策略cors、samesite,跨域帶上cookie