We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
To choose time is to save time.
WebLogic
ls
OA
Burp
Top500
memcached
Github
Wooyun Wiki
FTP
proFTPd
CVE-2015-3306
nmap
21
hydra
medusa
nmap -Pn -p21 ip
medusa -H ip.txt -U user.txt -P passwd.txt -M ftp
hydra -L username.txt -P passwd.txt ftp://ip
Access
PoC
md5()
randomStr()
0
Seebug
CMS
Wooyun
SQL
Python
The text was updated successfully, but these errors were encountered:
No branches or pull requests
0x01 Wooyun
WebLogic
反序列化命令执行ls
OA
系统弱口令Burp
/Top500
)memcached
未授权访问Github
泄漏Wooyun Wiki
FTP
服务器安全配置proFTPd
未授权的文件拷贝(CVE-2015-3306
)nmap
对21
端口的开放情况进行扫描,然后使用hydra
或者medusa
进行登陆验证或者暴力破解 端口扫描nmap -Pn -p21 ip
medusa -H ip.txt -U user.txt -P passwd.txt -M ftp
hydra -L username.txt -P passwd.txt ftp://ip
(hydra
不支持批量的导入)0x02 Seebug
Access
数据库PoC
中关于md5()
函数的验证md5()
,有的只能执行纯数字的md5()
randomStr()
函数可以正则只保留数字,开头不能为0
,有的网站可能会忽略开头的0
0x03 一天总结
Seebug
上提交了1个PoC
,关于这套CMS
还可以继续提交Wooyun
上打包了几个SQL
注入漏洞Python
框架没有学习,等学完了框架,再去填知道创宇的Python
坑The text was updated successfully, but these errors were encountered: