Technical Analysis of CVE-2020-25213: WP File Manager RCE Vulnerability
Background CVE-2020-25213, a Remote Code Execution (RCE) vulnerability in the WordPress WP-File-Manager plugin (version 6.0 to 6.8). WordPress is the […]
Background CVE-2020-25213, a Remote Code Execution (RCE) vulnerability in the WordPress WP-File-Manager plugin (version 6.0 to 6.8). WordPress is the […]
In Suricata’s official document, there are oversimplified descriptions for these three protocol options, and it’s really confusing. In order to
Above all, we need to know that asymmetric encryption is much slower than symmetric encryption. So, in practice, we usually
Memory Layout of a C Program A typical memory representation of a C program consists of the following sections. 使用
今天给单位的小年轻讲网络安全课程,用了 from_sqli_to_shell_i386 这个靶机。题目简单,iso 文件又小,很适合入门。 这个靶机上有一个网站。先找到网站的 SQL 注入点;然后通过 SQL 注入获取 admin 帐号密码;再使用 adm […]
Wireshark 主窗口 注意,数据包详情面板中展示的信息是经过 Wireshark 解析并”格式化”过的,方便阅读。最下面的数据包字节面板里才是这个包的真实数据。 过滤器栏 在主窗口的过滤器栏中输入过滤指令来筛选数据。 常用过滤 […]
参考官方文档:https://wiki.centos.org/zh/HowTos/Network/IPTables。 注意 iptables -A INPUT -m state –state ESTABLISHED,RELATED -j ACC […]
今天在某个技术群里有网友聊起CSRF攻击,就想起了以前写汤圆网时用到的“盐值”(unique_salt)与token。 一、什么是CSRF攻击及CSRF的防御 可以参考这篇文章:http://www.cnblogs.com/hyddd/archive/20 […]