- 遇到的问题:
- 文章,我读了十多遍,才弄懂了前因后果:
- 可能的原因:
- 我自己之前,对【域控】的了解很少;都是一些皮毛了解,也没自己操作过。
- 比如,域控的用户登录
- 是直接远程登录? 还是 nc的shell反弹 ?
- 比如,【ms14-068.py】的【-d选项】,用的是【dc1.contoso.com】
- 而这个【域控】,在截图中,没有体现出的位置。
- 漏洞标题:http://193.42.24.107:8081/vul/burteforce/bf_form.php 基于表单的暴力破解
- 漏洞等级:中
- 漏洞描述:
- 访问:
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# https://twitter.com/brsn76945860/status/1171233054951501824 | |
pip install mmh3 | |
----------------------------- | |
# python 2 | |
import mmh3 | |
import requests | |
response = requests.get('https://cybersecurity.wtf/favicon.ico') | |
favicon = response.content.encode('base64') |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
""" | |
参考资料: | |
1. [Python2写法](https://www.cnblogs.com/miaodaren/p/9177379.html) | |
2. [Python3改写](https://www.cnblogs.com/miaodaren/p/9177379.html) | |
以上两个办法,都是错误的!!! | |
3. [正确写法](https://gist.github.com/yehgdotnet/b9dfc618108d2f05845c4d8e28c5fc6a) | |
""" | |
import base64 |
OlderNewer