0%

优雅地使用 minecraft 官方 server + PCL2 联机游戏

最近学了《数字电路与逻辑分析》,想起来去年某学长考试前靠 MC 的红石电路复习,然后,本着学习数电摸鱼的目的,搭了一个 MC 的服务器(便于大家交流学习(逃

阅读全文 »

php中的escapeshellarg+escapeshellcmd漏洞

0x01 escapeshellarg()escapecmd()

escapeshellarg()escapecmd()是php预置的用于防范命令注入攻击的函数,官方文档中给出的用法如下:


escapeshellcmd

(PHP 4, PHP 5, PHP 7, PHP 8)
escapeshellcmd — shell 元字符转义

说明

escapeshellcmd ( string $command ) : string
escapeshellcmd() 对字符串中可能会欺骗shell命令执行任意命令的字符进行转义。此函数保证用户输入的数据在传送到 exec()system() 函数,或者 执行操作符 之前进行转义。

反斜线(\)会在以下字符之前插入: &#;`|*?~<>^()[]{}$\, \x0A\xFF'" 仅在不配对的时候被转义。 在 Windows 平台上,所有这些字符以及 %! 字符都会被空格代替。

阅读全文 »

Walkthrough for DC-03

1
2
3
4
5
6
7
8
9
10
11
12
13
Description

DC-3 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

As with the previous DC releases, this one is designed with beginners in mind, although this time around, there is only one flag, one entry point and no clues at all.

Linux skills and familiarity with the Linux command line are a must, as is some experience with basic penetration testing tools.

For beginners, Google can be of great assistance, but you can always tweet me at @DCAU7 for assistance to get you going again. But take note: I won't give you the answer, instead, I'll give you an idea about how to move forward.

For those with experience doing CTF and Boot2Root challenges, this probably won't take you long at all (in fact, it could take you less than 20 minutes easily).

If that's the case, and if you want it to be a bit more of a challenge, you can always redo the challenge and explore other ways of gaining root and obtaining the flag.
阅读全文 »

Walkthrough for DC-02

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Description

Much like DC-1, DC-2 is another purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing.
就像DC-1一样,DC-2是另一个专门构建的易受攻击的实验室,目的是获得渗透测试领域的经验。

As with the original DC-1, it's designed with beginners in mind.
与DC-1,它的设计充分考虑初学者。

Linux skills and familiarity with the Linux command line are a must, as is some experience with basic penetration testing tools.
需要具备Linux技能并熟悉Linux命令行,以及一些基本渗透测试工具。

Just like with DC-1, there are five flags including the final flag.
与DC-1一样,共有包括final flag在内的5个flag。

And again, just like with DC-1, the flags are important for beginners, but not so important for those who have experience.
同样,就像DC-1一样,flag对于初学者来说很重要,但对有经验的人则不那么重要。

In short, the only flag that really counts, is the final flag.
简而言之,唯一真正重要的flag是final flag。

For beginners, Google is your friend. Well, apart from all the privacy concerns etc etc.
对于初学者来说,Google是您的朋友。 好吧,除了所有的隐私问题等等。

I haven't explored all the ways to achieve root, as I scrapped the previous version I had been working on, and started completely fresh apart from the base OS install.
我没有探索获取root权限的所有方法,因为我废弃了我一直在使用的先前版本,并且除了基本的OS安装之外,还开始全新的学习。
阅读全文 »

Walkthrough for DC-01

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Description
简介

DC-1 is a purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing.
DC-1是为增长渗透测试经验而搭建的渗透测试靶机。

It was designed to be a challenge for beginners, but just how easy it is will depend on your skills and knowledge, and your ability to learn.
它设计给新手,但它的难度取决于你的知识与技能、以及学习能力。

To successfully complete this challenge, you will require Linux skills, familiarity with the Linux command line and experience with basic penetration testing tools, such as the tools that can be found on Kali Linux, or Parrot Security OS.
你需要linux技能(熟悉linux命令行)、基本的渗透测试工具(Kali Linux预装工具或Parrot Security OS)。

There are multiple ways of gaining root, however, I have included some flags which contain clues for beginners.
有很多种提权方法,不过,我在靶机中放置了一些flag作为给新手的提示。

There are five flags in total, but the ultimate goal is to find and read the flag in root's home directory. You don't even need to be root to do this, however, you will require root privileges.
一共有5个flag,但最终目标是读取root目录下的flag。你甚至不需要root账号,但至少需要root权限。

Depending on your skill level, you may be able to skip finding most of these flags and go straight for root.
如果你够强,你或许会跳过大多数flag直冲root。

Beginners may encounter challenges that they have never come across previously, but a Google search should be all that is required to obtain the information required to complete this challenge.
新手或许会遭遇到从来没有遇见过的挑战,去谷歌搜吧。
阅读全文 »

比赛介绍

MoeCTF是西安电子科技大学一年一度的信息安全新生夺旗赛, 由西电信息安全协会面向全体准大学生举办, 题目难度不高且坡度平缓, 比赛平台开设时间很长, 0基础新生可以通过本次比赛对信息安全夺旗赛(CTF)有一个基础且全面的认识, 中学参加过一些CTF比赛的准大学生们也可以通过本次比赛重温CTF赛事.

MoeCTF除了设有常规CTF比赛相关的分类之外也开设或有计划开设了算法编程类, 运维类, 旨在提供一个知识覆盖全面的做题环境, 同时帮助有过信息学竞赛经历的新生们更快转型.

阅读全文 »

  1. 所有图片通用方法

    • Stegosolve查看是否颜色通道隐写

    • UE查看内嵌字符串

    • Exiftool查看Exif信息

    • strings命令查看字符串,已知flag格式时可尝试搜索flag格式

    • binwalk查看是否有包含其他文件

阅读全文 »