Hello World Welcome to Hexo! This is your very first post. Check documentation for more info. If you get any problems when using Hexo, you can find the answer in troubleshooting or you can ask me on GitHub. Quick 2023-01-28 #Test
pwn.college: Exploitation Scenarios This is a test of callouts. [!Tip]hello Level 1这一题是让我们先输入一段shellcode,然后输入一个buffer。最简单的想法就是通过溢出将返回地址改为shellcode地址即可。这里的shellcode简单起见直接用前面获取flag的代码。 123456789101112131415161718192021222324252627from pw 2022-03-22 #pwn.college #Exploit
Web Cache Deception Attack Simulaton InstructionEnvironment Platform: Ubuntu Linux 20.04 64bit virtual machine. Softwares: Web server: Apache2 + MySQL + PHP Cache server: Varnish 6.6 Attack Login the virtual machine with both username 2022-03-16 #Web
pwn.college: Memory Error 12345678910r = pwn.process("/challenge/babymem_level") <whatever needed for level 7.1 to work>print(r.readall().decode("utf-8"))import pwnwith pwn.process("/challenge/ba 2022-03-12 #pwn.college
Web Cache Deception Attack Simulation AttackEnvironment Platform: Ubuntu Linux 20.04 64bit virtual machine. Softwares: Web server: Apache2 + MySQL + PHP Cache server: Varnish 6.6 Environment setupStep 1: Install Apache2 web server, PHP 2022-03-11 #Web
pwn.college: Shellcode Injection Level 012345678910111213141516171819202122232425262728/* execve(path='/bin///sh', argv=['sh','-p'], envp=0) */ /* push b'/bin///sh\x00' */ push 0x68 mo 2022-03-07 #pwn.college #Shellcode
pwn.college: Assembly Refreasher 模板 12345678910111213141516from pwn import *context.log_level='info'r = process(["/challenge/embryoasm_level"])shellcode = """ """payload = asm(shel 2022-02-27 #pwn.college #Assembly
XSS Attacks 本文是我的XSS学习笔记 https://portswigger.net/web-security/cross-site-scripting 什么是跨站脚本(Cross-site Scripting XSS)Cross-site scripting (also known as XSS) is a web security vulnerability that allows an attack 2022-02-21 #Security learning #XSS #Client security
Leetcode链表专题 1. 移除链表元素203. 移除链表元素给你一个链表的头节点 head 和一个整数 val ,请你删除链表中所有满足 Node.val == val 的节点,并返回 新的头节点 。 示例 1: 思路:比较简单,遍历链表,遇到val就删除。 123456789101112131415ListNode* dummyHead = new ListNode(0); // 设置一个虚拟 2022-02-18 #Leetcode
Wargame Natas 今天开始学习第二个wargame Natas。 Natas teaches the basics of serverside web-security. Each level of natas consists of its own website located at http://natasX.natas.labs.overthewire.org, where X is the level n 2022-02-10 #Security learning #Wargame #OverTheWire