歡迎來到 MOPCON 2020 共筆
主持人:這位是「資安抓漏專家」陳仲寬(奧義智慧)
講者曾帶過學生參加駭客比賽,還「測試」過校內主機取過個資
公司服務:除了資安,還有遊戲
除了冰淇淋(主業?)還有資安歐
'OR'1'='1'--
更全面性的檢測,更靈活的打法
各介紹網站幾乎都會提到「不限任何手段」
全面性的協助企業檢視其資安風險、資安策略
組織 BambookFox 團隊打 CTF,希望除了CTF外有梗食物的經驗
交大校園網路滲透測試
組織三年參與Bug Bounty
hacker 最想要的東西就是你的 RCE
對於其他固定套路的漏洞…
原碼掃描、框架就可以做
情境:我們已經能找到一個漏洞取得低權限帳戶。
If you can write arbitrary files, you will have very high possibilities to root
Shadow password
Crontab
…
Photo_user
bamboofox says: HIHO XDD
這不是 feature 這是 bug
How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE!
A New Era of SSRF -Exploiting URL Parser in Trending Programming Languages!
]]><
Command Injection
File Operation bypass Permission
SSRF
MOPCON 2020
or
or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up
Syntax | Example | Reference | |
---|---|---|---|
# Header | Header | 基本排版 | |
- Unordered List |
|
||
1. Ordered List |
|
||
- [ ] Todo List |
|
||
> Blockquote | Blockquote |
||
**Bold font** | Bold font | ||
*Italics font* | Italics font | ||
~~Strikethrough~~ | |||
19^th^ | 19th | ||
H~2~O | H2O | ||
++Inserted text++ | Inserted text | ||
==Marked text== | Marked text | ||
[link text](https:// "title") | Link | ||
 | Image | ||
`Code` | Code |
在筆記中貼入程式碼 | |
```javascript var i = 0; ``` |
|
||
:smile: | ![]() |
Emoji list | |
{%youtube youtube_id %} | Externals | ||
$L^aT_eX$ | LaTeX | ||
:::info This is a alert area. ::: |
This is a alert area. |
On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?
Please give us some advice and help us improve HackMD.
Syncing