File tree 3 files changed +11
-8
lines changed
3 files changed +11
-8
lines changed Original file line number Diff line number Diff line change 3
3
* /* /.DS_Store
4
4
* /* /* /.DS_Store
5
5
* .pyc
6
- # Something can't upload
6
+ # 其他人的项目
7
7
/antSword /*
8
8
/AWVS /WVS11 /* .exe
9
9
/BurpSuite
12
12
/caidao
13
13
/HashExtensions
14
14
/dirsearch
15
- # 不开放m0xiaoxi.php
15
+ # 暂不开放
16
16
/AD /WAF /m0xiaoxi.php
17
+ /AD /proxy
Original file line number Diff line number Diff line change 1
1
# 线下赛
2
2
3
- ![ CTF线下攻防赛] ( CTF线下攻防赛.png )
4
-
5
3
## Web
6
4
7
- 1 . [ 流量混淆脚本] ( https://github.com/momomoxiaoxi/CTFtools/tree/master/AD/ConfuseTraffic )
8
- 2 . [ WAF] ( https://github.com/momomoxiaoxi/CTFtools/tree/master/AD/WAF )
5
+ 1 . 流量混淆脚本
6
+ 2 . WAF
9
7
3 . 批量文件上传
10
8
4 . 权限维持
11
9
- 不死马 删不死马
12
10
- contrab
13
- - 猥琐流Webshell
11
+ - Webshell
14
12
5 . [ 文件监控] ( https://github.com/rustyJ4ck/FSMon ) ,防止恶意上传(没用过)
15
13
6 . 可视化流量分析 [ goaccess] ( https://github.com/allinurl/goaccess ) (没用过)
16
- 7 . PHP中转工具 就是把你的服务器当成一个中转器 直接中转分数最高的那个网站
14
+ 7 . PHP中转代理脚本
15
+ - 类似反向代理,反向代理一个你想搞事情的网站
16
+ - [ 7ghost] ( https://github.com/BevisGoh/7ghost ) 需要.htaccess解析
17
+ - 其实,在中转的时候还可以顺带抓包记录。最骚的场景就是A以为在攻击你(B),你开启反向代理代理了C,与此同时你抓了A的payload...等于做了一个中间人的工作,在不损失自己flag的前提下还能获取到攻击信息。此外,在7ghost的配置中还能把C返回的flag给替换掉。。是不是很骚😂
17
18
18
19
## Pwn
19
20
Original file line number Diff line number Diff line change 34
34
- [ weevely3] ( https://github.com/epinna/weevely3 )
35
35
10 . CVE
36
36
11 . 小工具
37
+ 12 . 线下赛
37
38
38
39
## Knowledge
You can’t perform that action at this time.
0 commit comments