Adam's Blog
  • 首页
  • 归档
  • 分类
  • 标签
  • 关于

Hello World

Welcome to Hexo! This is your very first post. Check documentation for more info. If you get any problems when using Hexo, you can find the answer in troubleshooting or you can ask me on GitHub. Quick
2023-01-28
#Test

pwn.college: Exploitation Scenarios

This is a test of callouts. [!Tip]hello Level 1这一题是让我们先输入一段shellcode,然后输入一个buffer。最简单的想法就是通过溢出将返回地址改为shellcode地址即可。这里的shellcode简单起见直接用前面获取flag的代码。 123456789101112131415161718192021222324252627from pw
2022-03-22
#pwn.college #Exploit

Web Cache Deception Attack Simulaton

InstructionEnvironment Platform: Ubuntu Linux 20.04 64bit virtual machine. Softwares: Web server: Apache2 + MySQL + PHP Cache server: Varnish 6.6 Attack Login the virtual machine with both username
2022-03-16
#Web

pwn.college: Memory Error

12345678910r = pwn.process("/challenge/babymem_level") <whatever needed for level 7.1 to work>print(r.readall().decode("utf-8"))import pwnwith pwn.process("/challenge/ba
2022-03-12
#pwn.college

Web Cache Deception Attack Simulation

AttackEnvironment Platform: Ubuntu Linux 20.04 64bit virtual machine. Softwares: Web server: Apache2 + MySQL + PHP Cache server: Varnish 6.6 Environment setupStep 1: Install Apache2 web server, PHP
2022-03-11
#Web

pwn.college: Shellcode Injection

Level 012345678910111213141516171819202122232425262728/* execve(path='/bin///sh', argv=['sh','-p'], envp=0) */ /* push b'/bin///sh\x00' */ push 0x68 mo
2022-03-07
#pwn.college #Shellcode

pwn.college: Assembly Refreasher

模板 12345678910111213141516from pwn import *context.log_level='info'r = process(["/challenge/embryoasm_level"])shellcode = """ """payload = asm(shel
2022-02-27
#pwn.college #Assembly

XSS Attacks

本文是我的XSS学习笔记 https://portswigger.net/web-security/cross-site-scripting 什么是跨站脚本(Cross-site Scripting XSS)Cross-site scripting (also known as XSS) is a web security vulnerability that allows an attack
2022-02-21
#Security learning #XSS #Client security

Leetcode链表专题

1. 移除链表元素203. 移除链表元素给你一个链表的头节点 head 和一个整数 val ,请你删除链表中所有满足 Node.val == val 的节点,并返回 新的头节点 。 示例 1: 思路:比较简单,遍历链表,遇到val就删除。 123456789101112131415ListNode* dummyHead = new ListNode(0); // 设置一个虚拟
2022-02-18
#Leetcode

Wargame Natas

今天开始学习第二个wargame Natas。 Natas teaches the basics of serverside web-security. Each level of natas consists of its own website located at http://natasX.natas.labs.overthewire.org, where X is the level n
2022-02-10
#Security learning #Wargame #OverTheWire
123

搜索

Hexo Fluid