自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(9)
  • 资源 (2)
  • 收藏
  • 关注

转载 Nebula: level06

exploit-exercises Nebula: level06In level06, we are told that the account credentials for flag06 user account come from a legacy unix system. Let's go straight to the bank.level06@nebula:~$

2015-02-08 09:37:26 346

转载 Nebula: level05

exploit-exercises Nebula: level05This is the write-up for level05 of Nebula wargame. We are told to check the flag05 home directory and look for weak permissions.level05@nebula:/home/flag05$

2015-02-08 09:16:52 776

转载 Nebula_Level04

http://www.kroosec.com/2012/10/nebula-level04.html    exploit-exercises Nebula: level04In level04 of Nebula wargame, we are tasked to exploit flag04 binary to read a token file. The so

2015-01-29 09:29:54 373

转载 Nebula_level03

exploit-exercises Nebula: level03In level03 challenge of Nebula, we are told that there is a crontab running every couple of minutes.level03@nebula:/home/flag03$ ls -ltotal 8drwxrwxrwx 2

2015-01-29 08:00:15 414

转载 Nebula_level02

exploit-exercises Nebula: level02In level02 Nebula challenge, we have the following source code#include #include #include #include #include int main(int argc, char **argv, ch

2015-01-29 07:49:06 367

转载 Nebula_level01

http://www.kroosec.com/2012/10/nebula-level01.htmlIn level01 of Nebula wargame, we are required to find a vulnerability that allows us to run arbitrary programs. The source code of flag01 is p

2015-01-28 01:48:34 424

原创 logic.smashthestack.org_level01

Getting StartedThe first level of this game is accessible via the web here: Level 1.After finishing the first level you will need to connect to the server via ssh with the following command:

2015-01-25 00:29:02 449

原创 nebula_level00

Level00 AboutThis level requires you to find a Set User ID program that will run as the“flag00” account. You could also find this by carefully looking in top leveldirectories in / for suspicious

2015-01-24 01:21:51 327

原创 start

start

2015-01-21 03:21:49 327

python灰帽子书源码

python灰帽子书的源码 难得的python代码

2011-04-28

vb病毒编写实例教程

vb病毒编写教程 一些vb病毒的基本编写参考教程

2011-06-05

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除