Article Tags
How to reproduce the Apache Struts2--048 remote code execution vulnerability

How to reproduce the Apache Struts2--048 remote code execution vulnerability

0x00 Introduction The Struts2 framework is an open source web application architecture for developing JavaEE web applications. It utilizes and extends JavaServletAPI and encourages developers to adopt MVC architecture. Struts2 takes the excellent design ideas of WebWork as the core, absorbs some advantages of the Struts framework, and provides a neater Web application framework implemented in the MVC design pattern. Overview of the 0x01 vulnerability. The ApacheStruts22.3.x series has the struts2-struts1-plugin plug-in enabled and the struts2-showcase directory exists. The cause of the vulnerability is when ActionMe

May 12, 2023 pm 07:43 PM
struts2
What does ip address conflict mean?

What does ip address conflict mean?

The meaning of IP address conflict is that in the same LAN, if two users use the same IP address at the same time, or one user has obtained an IP address through DHCP, and at this time, other users assign it manually. If the same IP address is specified, this will cause an IP address conflict and prevent one of the users from using the network normally. Causes and solutions to IP address conflicts: If two users on the same LAN use the same IP address at the same time, or one user has obtained an IP address through DHCP, and at this time other users assign it manually. If the same IP address is specified, this will cause an IP address conflict and prevent one of the users from using the network normally. So

May 12, 2023 pm 07:40 PM
ip地址
What is the batch injection plug-in generated by Burpsuit combined with SQLMapAPI?

What is the batch injection plug-in generated by Burpsuit combined with SQLMapAPI?

1.1 Changes: Added filtering settings, optimized display results, added running prompt information, added domain name regular matching. The entire plug-in is divided into three panels: task panel, sqlmapapi parameter configuration panel, and filter conditions panel. Task panel Server: the IP and port of the SQLmapapi service THREAD: the number of tasks detected simultaneously Domain: the domain name to be detected, supports regular matching CLEAN: clears the task cache list TEST: tests whether the SQLmapapi connection is successful START: turns on detection The lower left is the task list and Task status, below the button on the right is the information prompt area, and below it are the request details and scan results. The settings here in the sqlmapapi parameter configuration panel refer to sql

May 12, 2023 pm 07:19 PM
sqlmapapi burpsuit
How to implement vulnerability analysis caused by use after release of C++ program

How to implement vulnerability analysis caused by use after release of C++ program

1. Use after release When dynamically allocated memory is released, the contents of the memory are undefined and may remain intact and accessible, because when the released memory block is reallocated or recycled is determined by the memory manager, but , or the contents of this memory may have been changed, causing unexpected program behavior. Therefore, when the memory is released, it is guaranteed that it will no longer be written to or read from. 2. Harm of use after release Problems caused by improper memory management are common vulnerabilities in C/C++ programs. Use after free can lead to potential exploitable risks, including abnormal program termination, arbitrary code execution, and denial of service attacks. From January to November 2018, there were a total of 134 vulnerability information related to it in CVE. Some of the vulnerabilities are as follows: CVE vulnerabilities

May 12, 2023 pm 05:37 PM
C++
How to conduct in-depth analysis of the drupal8 framework and dynamic debugging of vulnerabilities

How to conduct in-depth analysis of the drupal8 framework and dynamic debugging of vulnerabilities

Foreword In the drupal framework, the most classic and closest to us is the CVE-2018-7600 vulnerability in 2018. However, in the process of reading and studying this vulnerability analysis article, I found that they are all detailed analysis of this vulnerability point. People who are not very familiar with the running process of this framework may have difficulty understanding it after reading it. The following is mainly divided into two parts: The first part is an introduction to the drupal framework process (here mainly for the 8.x series), letting us know how the drupal framework based on the symfony open source framework uses the listener mode to support the entire complex Process flow and give us a basic understanding of how the framework handles a request. The second part, combined with the framework to detect vulnerabilities

May 12, 2023 pm 05:19 PM
drupal8
How to analyze Nazar components in depth

How to analyze Nazar components in depth

6:22AM11/7/2012confickersstillontarget6:18AM11/7/2012checkinglogs-weareclean8:16PM7/2/2012-BOOM!,gotthecallback These are the records left by Equation Group (NSA) in attacking the target system, which were later leaked by ShadowBrokers. Recently, security researchers revealed a previously misidentified and unknown threat group called Nazar. The Nazar components will be analyzed in depth below. Background The Shadow Brokers leaked data brought numerous vulnerabilities, such as EternalBlue, into the spotlight, but

May 12, 2023 pm 04:46 PM
Nazar
How to analyze gunicorn Arbiter source code

How to analyze gunicorn Arbiter source code

As mentioned earlier, Arbiter is the core of the gunicornmaster process. Arbiter is mainly responsible for managing worker processes, including starting, monitoring, and killing worker processes. At the same time, Arbiter can also hot update (reload) App applications or upgrade gunicorn online when certain signals occur. The core code of Arbiter is in one file, and the amount of code is not large. The source code is here: https://github.com/benoitc/gunicorn. Arbiter mainly has the following methods: setup: handles configuration items, the most important ones are the number of workers and the worker working model i

May 12, 2023 pm 04:28 PM
gunicorn Arbiter
Analysis of smali complex class examples in Android reverse engineering

Analysis of smali complex class examples in Android reverse engineering

1. If you don’t understand anything about complex Java classes, please see: JAVA General Outline or Construction Method and post the code here. It is very simple and not difficult. 2. Smali code We need to convert java code to smali code. You can refer to java to smali. We will look at it in modules. 2.1 The first module - information module. This module is basic information, describing the class name, etc. Just knowing it is not very helpful for analysis. 2.2 The second module - the construction method. Let's analyze it sentence by sentence. If there are repeated parts in the previous analysis, we will not repeat them. But a link will be provided. The sentence .methodpublicconstructor(Ljava/lang/String;I)V is divided into .m

May 12, 2023 pm 04:22 PM
Android smali
EVE-NG Mirror Example Analysis

EVE-NG Mirror Example Analysis

1. Download and decompress the compressed package ikuai-8.rar 2. Upload to the /opt/unetlab/addons/qemu directory 3. Log in to EVE via SSH and execute the script root@eve-ng:~#cd/opt/unetlab/addons /qemu/ikuai-8root@eve-ng:/opt/unetlab/addons/qemu/ikuai-8#sourceikuai.shGreat!!!"iKuaiDevice"importsuccessfully!!!root@eve-ng:/opt/unetl

May 12, 2023 pm 03:40 PM
eve-ng
How to use the network security audit tool Nmap

How to use the network security audit tool Nmap

1. Software download https://nmap.org/download.html 2. Scan IPnmap192.168.1.10#Scan single IPnmap192.168.1.10-100#Scan IP segment nmap192.168.1.10192.168.1.11#Scan single multiple IPnmap192 .168.1.1/24#Scan the entire network segment nmap-iLlist.txt#Scan according to the file list#list.txt192.168.1.20192.168.1.21nmap-iR3#Randomly scan 3 IPsnmap192.168.1.10-100--ex

May 12, 2023 pm 03:34 PM
nmap
What are the fixes for PrestaShop website vulnerabilities?

What are the fixes for PrestaShop website vulnerabilities?

There are more and more loopholes in the PrestaShop website. The website system is an open source system used by many foreign trade websites. From the previous initial version 1.0 to the current version 1.7, it has gone through many upgrades, and more and more people are using the system. There are many domestic foreign trade companies using this system. PrestaShop has high scalability, many templates, free switching of multiple currencies, and supports credit card and Paypal payment. It is the first choice for foreign trade websites. Just in the past few days, it was revealed that PrestaShop has a remote code injection vulnerability. This vulnerability has a relatively small scope of impact and is relatively harmful. It can upload a webshell to the root directory of the website. On November 7, 2018, PrestaShop officially released the latest

May 12, 2023 pm 03:07 PM
PrestaShop
How to analyze UDP protocol

How to analyze UDP protocol

1. Socket: socket: ip address + port number. In the TCP/IP protocol, it uniquely identifies a process in network communication. Sockets are used to describe a one-to-one relationship between network connections. The TCP/IP protocol stipulates that network data flow should use big-endian byte order, that is, (memory) low address high byte (data). 2. UDP_SOCKET related UDP protocol----User Datagram Protocol (non-connection oriented)---SOCK_DGRAMh represents host, n represents network, l represents 32-bit long integer, and s represents 16-bit short integer. The IPv4 address format is defined in netinet/in.h, IPv4 address: sockadd

May 12, 2023 pm 02:49 PM
UDP
How to analyze data link protocols HDLC and PPP

How to analyze data link protocols HDLC and PPP

1. Commonly used data link protocols (HDLC, PPP) (1) The idea of ​​analyzing the protocol Step 1: Understand the overview of the protocol, know the purpose and basic characteristics of this protocol design Step 2: Use the protocol data unit (for the data link layer The format of the frame) is the main clue to study the specific implementation of the protocol. Step 3: How does the protocol solve practical problems? (2) HDLC protocol (Advanced Data Link Control Protocol) (bit-oriented protocol) HDLC protocol is a bit-oriented protocol, which mainly solves data link layer link management, addressing, frame synchronization, error control, and flow control , which has two characteristics: equilibrium system and non-equilibrium system. 1. Composition of HDLC: frame structure (syntax) procedure elements (syntax) rule type (semantics) usage

May 12, 2023 pm 02:43 PM
HDLC ppp
Example analysis of webshell uploaded traceability events

Example analysis of webshell uploaded traceability events

First of all, I understand that what I have to do is not to find where the uploaded location appears. I should log on to the server to perform webshel ​​inspection and inspection to see if it has been invaded by others, whether there is a backdoor, etc. etc. Although the IP address reported is our company's IP address, if a few webshells are missed and uploaded successfully by others but not detected, what can we do if the server is invaded? So I went up to inspect the server, uploaded this webshell killing tool for killing, used netstat-anpt and iptables-L to determine whether there was a backdoor established, checked whether there was a mining program occupying the CPU, etc., I will not go into details here. . Fortunately, the server was not compromised, and then

May 12, 2023 pm 02:43 PM
webshell

Hot tools Tags

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

vc9-vc14 (32+64 bit) runtime library collection (link below)

vc9-vc14 (32+64 bit) runtime library collection (link below)

Download the collection of runtime libraries required for phpStudy installation

VC9 32-bit

VC9 32-bit

VC9 32-bit phpstudy integrated installation environment runtime library

PHP programmer toolbox full version

PHP programmer toolbox full version

Programmer Toolbox v1.0 PHP Integrated Environment

VC11 32-bit

VC11 32-bit

VC11 32-bit phpstudy integrated installation environment runtime library

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use