├── styles ├── epub.css ├── pdf.css ├── print.css └── website.css ├── zh-cn ├── img │ ├── 0x14.png │ ├── 0x15.png │ ├── 0xc.png │ ├── 0x131.png │ ├── 0x132.png │ ├── 0x501.png │ ├── 0x502.png │ ├── 0x503.png │ ├── 0x504.png │ └── 0x601.png ├── 0x15.md ├── 0x14.md ├── 0x13.md ├── 0x5.md ├── 0x4.md ├── 0x6.md ├── 0x3.md ├── 0x11.md ├── 0x9.md ├── 0x16.md ├── 0x02.md ├── 0x2.md ├── 0x8.md ├── 0x1.md ├── 0xc.md ├── 0x10.md ├── 0x0.md └── 0x7.md ├── SUMMARY.md ├── LICENSE └── README.md /styles/epub.css: -------------------------------------------------------------------------------- 1 | /* CSS for epub */ 2 | -------------------------------------------------------------------------------- /styles/pdf.css: -------------------------------------------------------------------------------- 1 | /* CSS for pdf */ 2 | -------------------------------------------------------------------------------- /styles/print.css: -------------------------------------------------------------------------------- 1 | /* CSS for print */ 2 | -------------------------------------------------------------------------------- /styles/website.css: -------------------------------------------------------------------------------- 1 | /* CSS for website */ 2 | -------------------------------------------------------------------------------- /zh-cn/img/0x14.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/smartFlash/pySecurity/HEAD/zh-cn/img/0x14.png -------------------------------------------------------------------------------- /zh-cn/img/0x15.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/smartFlash/pySecurity/HEAD/zh-cn/img/0x15.png -------------------------------------------------------------------------------- /zh-cn/img/0xc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/smartFlash/pySecurity/HEAD/zh-cn/img/0xc.png -------------------------------------------------------------------------------- /zh-cn/img/0x131.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/smartFlash/pySecurity/HEAD/zh-cn/img/0x131.png -------------------------------------------------------------------------------- /zh-cn/img/0x132.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/smartFlash/pySecurity/HEAD/zh-cn/img/0x132.png -------------------------------------------------------------------------------- /zh-cn/img/0x501.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/smartFlash/pySecurity/HEAD/zh-cn/img/0x501.png -------------------------------------------------------------------------------- /zh-cn/img/0x502.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/smartFlash/pySecurity/HEAD/zh-cn/img/0x502.png -------------------------------------------------------------------------------- /zh-cn/img/0x503.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/smartFlash/pySecurity/HEAD/zh-cn/img/0x503.png -------------------------------------------------------------------------------- /zh-cn/img/0x504.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/smartFlash/pySecurity/HEAD/zh-cn/img/0x504.png -------------------------------------------------------------------------------- /zh-cn/img/0x601.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/smartFlash/pySecurity/HEAD/zh-cn/img/0x601.png -------------------------------------------------------------------------------- /SUMMARY.md: -------------------------------------------------------------------------------- 1 | # Summary 2 | 3 | * [Introduction](README.md) 4 | * [入门](zh-cn/0x0.md) 5 | * [入门 Pt.2](zh-cn/0x02.md) 6 | * [端口扫描](zh-cn/0x1.md) 7 | * [反向shell](zh-cn/0x2.md) 8 | * [模糊测试](zh-cn/0x3.md) 9 | * [Python转exe](zh-cn/0x4.md) 10 | * [Web请求](zh-cn/0x5.md) 11 | * [爬虫](zh-cn/0x6.md) 12 | * [Web扫描和利用](zh-cn/0x7.md) 13 | * [Whois查询](zh-cn/0x8.md) 14 | * [系统命令调用](zh-cn/0x9.md) 15 | * [Python版的Metasploit](zh-cn/0x10.md) 16 | * [伪终端](zh-cn/0x11.md) 17 | * [exp编写](zh-cn/0xc.md) 18 | * [用例1: CVE-2014-6271](zh-cn/0x13.md) 19 | * [用例2: CVE-2012-1823](zh-cn/0x14.md) 20 | * [用例3: CVE-2012-3152](zh-cn/0x15.md) 21 | * [用例4: CVE-2014-3704](zh-cn/0x16.md) 22 | 23 | -------------------------------------------------------------------------------- /zh-cn/0x15.md: -------------------------------------------------------------------------------- 1 | # CVE-2012-3152 2 | 3 | 4 | --- 5 | 6 | 这一小段代码是演示的CVE-2012-3152 Oracle本地文件包含的漏洞利用PoC,与前一个PoC示例有点类似,也是通过循环可以无限输入需要访问文件目录。对于下面这一段脚本无前面有点不同。增加了一点交互性的东西。通过[termcolor](https://pypi.python.org/packages/source/t/termcolor/termcolor-1.1.0.tar.gz)模块来实现: 7 | 8 | ``` 9 | #!/usr/bin/python 10 | import sys, urllib2 # 导入需要的包 11 | from termcolor import colored # 这里需要下载"termcolor"模块 12 | 13 | if len(sys.argv) != 2: # 检查输入的格式是否正确"