I. Front-End Only Detection, No Back-End Validation (ctfshow-web152) Uploading files with extensions like .php is not allowed. Disable JavaScript. Upload a valid .png image, then use Burpsuite to change the extension to .php to bypass front-end detection. II. Exploiting .user.ini Files (ctfshow-web1...
What is PyJWT? PyJWT is a Python library designed for creating, parsing, and validating JSON Web Tokens (JWT). JWT is a compact, self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed. PyJ...
When connecting to a remote host via SSH, you might encounter a warning like this: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHI...
Modify Source Code ==== 1. Extend CA Expiration to 100 Years (Default is 10 Years) --------------------------- Edit file: `./staging/src/k8s.io/client-go/util/cert/cert.go```` // Locate the NotAfter field within this function: // NotAfter: now.Add(duration365d * 10).UTC() // Change default 10-year...
API encryption prtoects data during transmission using algorithms like AES, DES, and RSA. Testing verifies both the correctness and security of these encryption methods. Symmetric Encryption Symmetric encryption uses a single key for both encryption and decryption. Common algorithms include: DES 3DE...
Command History Auditing Enabling command history with timestamps and increasing the history size provides visibility into system operations. This helps track user activiites and troubleshoot issues: # /etc/profile.d/history_config.sh export HISTSIZE=10000 export HISTTIMEFORMAT="%Y-%m-%d %H:%M:...
1. Attack Classification To conduct an incident response, you must first understand what type of attack you are dealing with. Common attack categories include: System Intrusion: Viruses, Trojans, ransomware, remote control backdoors. Web Intrusion: Web page malware, homepage tampering, Webshell. Net...
Minimalist Spring Security 6 + Front-Back Separation Implementation: Focus on Understanding Workflow Spring Security is relatively simple to use in Spring MVC, with built-in login, logout pages, session management, etc. However, how to implement a front-back separated project with Spring Security is...
Core Security ConceptsSASL (Simple Authentication and Security Layer): Handles identity verification during client-to-server connections, ensuring credential data is handled securely.SSL/TLS: Encrypts the data transmitted over the network. Relying on SASL alone leaves the payload unencrypted after a...
Exploiting HashMap Deserialization via URLDNS Chain Deserializing a HashMap instance triggers its readObject() method. The vulnerability lies in how this method processes keys during deserialization. Specifically, it recalculates hash values for all keys by invoking each key's hashCode() method. Whe...