목록전체 글 (36)
-
$SourceFileLocation = $env:SystemRoot + '\System32\WindowsPowerShell\v1.0\powershell.exe' $SourceCommand = @' -Command "$wsh = New-Object -ComObject Wscript.Shell; $wsh.Popup('you hacked by me');" '@ # $ShortcutLocation = 'C:\Users\miny7\Desktop\powershell_test.lnk' $ShortcutLocation = $env:APPDATA + '\Microsoft\Windows\Start Menu\Programs\Startup\powershell.exe.lnk' $WScriptShell = New-Object -..
$Body = @{ id = 'admin' pw = 'admin' } $LoginResponse = Invoke-WebRequest 'http://YOURDOMAIN/login.php' -SessionVariable 'Session' -Body $Body -Method 'GET' $ProfileResponse = Invoke-WebRequest 'http://YOURDOMAIN/main.php' -WebSession $Session $ProfileResponse 나중에 심심하면 Brute Force도 괜찮을듯?

0) 문제 개요 #include #include void login(){ int passcode1; int passcode2; printf("enter passcode1 : "); scanf("%d", passcode1); fflush(stdin); // ha! mommy told me that 32bit is vulnerable to bruteforcing :) printf("enter passcode2 : "); scanf("%d", passcode2); printf("checking...\n"); if(passcode1==338150 && passcode2==13371337){ printf("Login OK!\n"); system("/bin/cat flag"); } else{ printf("Logi..