公眾號運營快一年,都是記錄個人工作記錄和分享,自己也比較佛系,有覺得發(fā)的必要才發(fā),最近整理了一下一年來的相關(guān)的公眾號推文(也把相關(guān)的文章進行歸類整理一下)。
一、漏洞復現(xiàn)(原創(chuàng))
1、CVE -2020-13942 (Apache Unomi 遠程代碼執(zhí)行漏洞)復現(xiàn)
https://mp.weixin.qq.com/s/fQSRXk9FilS4ImUOH5lvuQ
2、CVE-2020-9484 (Tomcat cluster sync-session)復現(xiàn)
https://mp.weixin.qq.com/s/z5Lo93UXPCG0kNPcephI4Q
3、Axis1.4 遠程命令執(zhí)行(CVE-2019-0227)復現(xiàn)
https://mp.weixin.qq.com/s/9gnCHYcygI1SqqNTWtuDWQ
4、Apache Flink未授權(quán)訪問-遠程代碼命令執(zhí)行-復現(xiàn)
https://mp.weixin.qq.com/s/aomCajnZVA9WlnBqTE_QPg
5、CVE-2020-8209(Citrix Endpoint Management 任意文件讀取)
https://mp.weixin.qq.com/s/EiPdSw9d7cN0lMjXVxwvVA
6、Thinkadmin v6任意文件讀取漏洞(CVE-2020-25540)復現(xiàn)
https://mp.weixin.qq.com/s/Gr5yE1GKSr3ptB4xx2mVmA
https://mp.weixin.qq.com/s/QVhaN7BRu0iHrFIcBvlx8A
https://mp.weixin.qq.com/s/oueVB5ztL1ij4RU-T1fOhw
9、通達OA V11.6-刪除認證文件getshell復現(xiàn)
https://mp.weixin.qq.com/s/QCN209oNbsG5BZcxv3fzUQ
https://mp.weixin.qq.com/s/mY07eR6OnbRueGcITgxb7A
11、通達OA 前臺任意用戶登錄漏洞復現(xiàn)(更新手工獲取cookie過程)
https://mp.weixin.qq.com/s/P-LC0fosKu0k7pCiBvQXPw
https://mp.weixin.qq.com/s/w24wBsOR7x1FcSadmUfIJQ
13、深信服EDR終端檢測平臺-任意用戶登錄漏洞復現(xiàn)
https://mp.weixin.qq.com/s/oqEhMCWdfHNdeBFttzbXlw
https://mp.weixin.qq.com/s/KVhd7ifkuD5U28NUUbGrTg
15、CISCO ASA任意文件讀取漏洞復現(xiàn) (CVE-2020-3452)
https://mp.weixin.qq.com/s/i_x7gx_VratC6t8PaCg-Kg
16、CVE-2020-5902(BIG-IP RCE)復現(xiàn)
https://mp.weixin.qq.com/s/twTCflFpxmOhA0gmAuwImA
17、Saltstack CVE-2020-11651和CVE-2020-11652復現(xiàn)
https://mp.weixin.qq.com/s/ks9nCbVB-aTt-IJMA6b4_w
18、Fastjson1.2.47反序列化漏洞復現(xiàn)
https://mp.weixin.qq.com/s/69NCDDSaa07YY7DwyC9fgA
19、PHP imap 遠程命令執(zhí)行漏洞(CVE-2018-19518)復現(xiàn)
https://mp.weixin.qq.com/s/4ClmkKeT3Kqc42F3ywfOlQ
20、php-fpm (CVE-2019-11043)漏洞復現(xiàn)
https://mp.weixin.qq.com/s/4giXc5mLuPD84GjqjvTXbA
21、JoomlaRCE遠程代碼執(zhí)行-CVE-2020-11890-10238-10239( 三個)復現(xiàn)
https://mp.weixin.qq.com/s/siQrh0Zjbo_VePIe9kSI9w
22、Joomla-3.4.6遠程代碼執(zhí)行復現(xiàn)
https://mp.weixin.qq.com/s/FYUMWy74l89cPDYTXo_Gig
23、CVE-2020-7471-Django SQL注入漏洞復現(xiàn)
https://mp.weixin.qq.com/s/CT5vM63URwSKmiPwwnxBhQ
24、Nexus Repository Manager OSS Pro EL表達式遠程代碼執(zhí)行CVE-2020-10199_10204
https://mp.weixin.qq.com/s/n-_tXXrGyEPp-IgA19IS-Q
25、Nexus Repository Manager 3 遠程命令執(zhí)行漏洞(CVE-2019-7238)復現(xiàn)
https://mp.weixin.qq.com/s/0FEu1-CKb7LalTdNajYnDA
26、Git憑證泄露漏洞(CVE-2020-5260)復現(xiàn)
https://mp.weixin.qq.com/s/SP0SwK9e78RlVR9oi0lU8A
27、Draytek企業(yè)網(wǎng)絡(luò)設(shè)備命令注入復現(xiàn)(CVE-2020-8515)
https://mp.weixin.qq.com/s/exz2utSbA_-YXM5htd4lxA
28、WebLogic 反序列化漏洞(CVE-2019-2890)復現(xiàn)
https://mp.weixin.qq.com/s/Ya9jCaPa2kWqOzAZpRgkWg
29、Jenkins-CI 遠程代碼執(zhí)行漏洞(CVE-2017-1000353)項目中遇到復現(xiàn)其他方式嘗試
https://mp.weixin.qq.com/s/cNYqAXGaJXssAoar6rArfg
https://mp.weixin.qq.com/s/0QRywDw5I85JyvhvFJZg4g
31、(CVE-2020-17530)Struts2 S2-061 遠程命令執(zhí)行漏洞復現(xiàn)
https://mp.weixin.qq.com/s/KyOTJtRvUm9pFXei0OZlVg
32、(CVE-2020-7961)Liferay Portal RCE 反序列化命令執(zhí)行漏洞
https://mp.weixin.qq.com/s/Jni6hoqMVjs5yzZpiBqkvw
33、SaltStack Shell 注入 (CVE-2020-16846)漏洞復現(xiàn)
https://mp.weixin.qq.com/s/NEeGbPM2A-fnrJjJapmpzQ
34、PHPMailer遠程命令執(zhí)行漏洞復現(xiàn)
https://mp.weixin.qq.com/s/iYUGj-iOOv6oHdex36L4GA
二、代碼審計學習記錄(原創(chuàng))
https://mp.weixin.qq.com/s/cOVmceXUhqqMtLIZyRtzsA
https://mp.weixin.qq.com/s/ee7_IOGmji3GhUPnFeRruQ
https://mp.weixin.qq.com/s/M-o2tl78kA1PYH9IICsRQQ
https://mp.weixin.qq.com/s/Hv1vSUCJDjzccHoDlAoLrQ
https://mp.weixin.qq.com/s/wnFfRmYw6I-nUa2DW_CN1Q
https://mp.weixin.qq.com/s/6it0sMCS3e59pEnpGt6EMw
https://mp.weixin.qq.com/s/u5A-z7hTe4QDtIisXSJ2JA
https://mp.weixin.qq.com/s/kwH7cRkESC92B1yyRRYZKA
9、漏洞代碼調(diào)試(一):Strtus2-048代碼分析調(diào)試-(CVE-2017-9791)
https://mp.weixin.qq.com/s/rknk46VxXfbokH1gO1mcLQ
10、漏洞代碼調(diào)試(二):Strtus2-001代碼分析調(diào)試
https://mp.weixin.qq.com/s/001phESFHXPECS9-v5mOtQ
三、Java開發(fā)&python腳本編寫&其他(原創(chuàng))
1、Java thelostworld DBcrack開發(fā)(一)
https://mp.weixin.qq.com/s/IcqBDhILA6b34GOfqzdSvw
2、Java POI解析Word提取數(shù)據(jù)存儲在Excel
https://mp.weixin.qq.com/s/4ieaida3LyMUOQLt5TbfWQ
https://mp.weixin.qq.com/s/4cRkEB1p93kp9aGH4OdX2g
https://mp.weixin.qq.com/s/LTzBXbV5FWhmYCONgDrfkQ
5、【編程】Python中python-nmap掃描參數(shù)(一)
https://mp.weixin.qq.com/s/5pVUm0JgbNdsN3PjH_E9_g
https://mp.weixin.qq.com/s/1dvOL47UuDk1bCov37kuVA
https://mp.weixin.qq.com/s/tTkVZPXbbeGVHd2zM4Vffg
https://mp.weixin.qq.com/s/StHxdrmkRX7MwpT41Ja2GQ
四、CTF靶機(轉(zhuǎn)載)
免責聲明:本站提供安全工具、程序(方法)可能帶有攻擊性,僅供安全研究與教學之用,風險自負!
轉(zhuǎn)載聲明:著作權(quán)歸作者所有。商業(yè)轉(zhuǎn)載請聯(lián)系作者獲得授權(quán),非商業(yè)轉(zhuǎn)載請注明出處。
訂閱查看更多復現(xiàn)文章、學習筆記
thelostworld
安全路上,與你并肩前行!!!!
?