歡迎來到 MOPCON 2020 共筆
主持人:這位是「資安抓漏專家」陳仲寬(奧義智慧)
講者曾帶過學生參加駭客比賽,還「測試」過校內主機取過個資
公司服務:除了資安,還有遊戲
除了冰淇淋(主業?)還有資安歐
'OR'1'='1'--
更全面性的檢測,更靈活的打法
各介紹網站幾乎都會提到「不限任何手段」
全面性的協助企業檢視其資安風險、資安策略
組織 BambookFox 團隊打 CTF,希望除了CTF外有梗食物的經驗
交大校園網路滲透測試
組織三年參與Bug Bounty
hacker 最想要的東西就是你的 RCE
對於其他固定套路的漏洞…
原碼掃描、框架就可以做
情境:我們已經能找到一個漏洞取得低權限帳戶。
If you can write arbitrary files, you will have very high possibilities to root
Shadow password
Crontab
…
Photo_user
bamboofox says: HIHO XDD
這不是 feature 這是 bug
How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE!
A New Era of SSRF -Exploiting URL Parser in Trending Programming Languages!
]]><
Command Injection
File Operation bypass Permission
SSRF
MOPCON 2020
or
or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up
Syntax | Example | Reference | |
---|---|---|---|
# Header | Header | 基本排版 | |
- Unordered List |
|
||
1. Ordered List |
|
||
- [ ] Todo List |
|
||
> Blockquote | Blockquote |
||
**Bold font** | Bold font | ||
*Italics font* | Italics font | ||
~~Strikethrough~~ | |||
19^th^ | 19th | ||
H~2~O | H2O | ||
++Inserted text++ | Inserted text | ||
==Marked text== | Marked text | ||
[link text](https:// "title") | Link | ||
 | Image | ||
`Code` | Code |
在筆記中貼入程式碼 | |
```javascript var i = 0; ``` |
|
||
:smile: | ![]() |
Emoji list | |
{%youtube youtube_id %} | Externals | ||
$L^aT_eX$ | LaTeX | ||
:::info This is a alert area. ::: |
This is a alert area. |
On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?
Please give us some advice and help us improve HackMD.
Do you want to remove this version name and description?
Syncing