w0s1np

w0s1np

记录学习和思考 快就是慢、慢就是快 静下心来学习
github
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover

JDBC H2 Attack

H2 $$ 在 h2 中代表设置函数 eval 执行变异好的 var3 名称的脚本 调用栈: Copy loadFromSource:102, TriggerObject (org.h2.schema) load:82, TriggerObject (org.h2…
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover

JNDI注入

0x01 什么是 JNDI RMI && LDAP 目录是一种分布式数据库,目录服务是由目录数据库和一套访问协议组成的系统。LDAP 全称是轻量级目录访问协议,它提供了一种查询、浏览、搜索和修改互联网目录数据的机制,运行在 TCP/IP 协议栈之上,基于 C/S 架构。除了…
cover

NetAttackClassifier

一个基于 Snort 规则和 ATT&CK 框架的网络流量分析与威胁分类工具 🕵️♂️ 基于 Snort 的异常流量检测 🎯 ATT&CK 技战术映射 🧬 高细粒度流量分类 地址: https://github.com/w0s1np…
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover

JEP290绕过

前言 上文已经分析过 rmi 反序列化的几种攻击方法,这篇文章就学习了一下 JEP290 机制的检测和绕过思路,整个流程是比较清楚的了,就是让 registry 当作 client 端向恶意 jrmp 服务端发起 rmi 请求,此时环境的 filter 为空 JEP290 是什么…
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover

Java RMI及其反序列化学习

因为篇幅较长、JEP290 bypass 放在后面一篇文章中 网上已经有了很多关于此攻击的文章,作为初学者,再次写下这篇文章需要做哪些事,而不是一味的搬砖、炒冷饭 记录、理解关于此内容的部分概念 记录已有 poc、exp , 方便后续直接使用 在合适的地方书写自己的思考…
Ownership of this blog data is guaranteed by blockchain and smart contracts to the creator alone.