首先通过mimikatz 抓取明文密码 mimikatz 1.通过wmiexec https://github.com/maaaaz/impacket-examples-windows python -m pip&nb...
信息安全
内网技巧-Linux权限维持之PAM万能密码登录
原文地址:https://xz.aliyun.com/t/8618 试验环境:Centos8.2 pam版本1.3.1 [root@localhost ~]# cat /etc/redhat-release CentOS Linux release 8.2.2004 (Core) [root@localhost ~]# r...
通达OA 后台SQL 注入
POST /general/appbuilder/web/officeproduct/productapply/applyprobygroup HTTP/1.1 Host: 10.211.55.5 Content-Length: 39 Accept: */* DNT: 1 X-Requested-With: XMLHttpRequest ...
CVE-2020-14882 weblogic 未授权命令执行复现
https://github.com/jas502n/CVE-2020-14882 weblogic 12 /console/css/%2e%2e%2fconsole.portal?_nfpb=true&_pageLabel=HomePage1&handle=com.tangosol...
密码保护:bypass 各大waf
1. 百度云盾 (好像是CF的东西) POST POST / HTTP/1.1 Host: www.sglynp.com Connection: close Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5....
Apache Solr 命令执行
使用Docker docker pull solr docker run --name solr2 -d -p 8081:8983 solr 验证脚本 #!/usr/bi...
泛微OA数据库配置信息泄漏 POC
# -*- coding:utf-8 -*- #Author:print("") import pyDes,requests import sys def desdecode(secret_key,s): cipherX = pyDes.des(' ') cipherX.setKey(secret_key) y = ciphe...
CVE-2019-16278
https://github.com/jas502n/CVE-2019-16278 Exploits for CVE-2019-16278 and CVE-2019-16279 Nostromo httpd is prone to 2 cricital vulnerabilities for versions <= 1.9.6 (0day =]) firs...
记一次内网渗透
无意中拿到了一个shell 然后花了几天内网渗透。还是有点收获的 没啥技巧可言了。都是一些瞎操作了。别喷就行了 先介绍一下环境把 WEB: 内网主机 192.168.1.231 (无域...
蚁剑disable_functions bypass 研究
文章地址: https://github.com/AntSwordProject/AntSword-Labs/tree/master/bypass_disable_functions 蚁剑下载地址 https://gitee.com/AntSwordProject/AntSword-Loader 最...