Reverse Interactive Shell in Python

Background

It’s been a really long time since last time I took participated in a CTF game. Last weekend, Randomly found an ongoing CTF game – GACTF.

There was a web challenge named XWIKI. That challenge provided an environment with XWIKI, an open source Wiki system. To dig more ways, I built a[……]

Read more

A New GitHack Script

Git hack happens when site maintainers use Git to manage the source code of the website but forget to delete .git directory. By accessing http://your.target.site/.git/ , you can easily find Git information and even the source code of the target website. Sometimes you may see 403 when you are trying to visit that URL, but that is because the access to directories is restricted. In this case, you can still access and download certain files if you know the exact URL to the file.

[……]

Read more

K Sum Problem

K sum problems are the sort of problems that asking you to find the k numbers whose sum is the target when given a number array or list. On LeetCode, there are two sum and three sum problems. Today, I am gonna discuss such kind of problems. 


[……]

Read more

Machine Learning – KNN

When you given a set of commands from a log file such as .bash_history or something similar, you can definitely judge if this set of commands reveals a evil attack to your computer system by reading it lines by lines if there is not too many commands. However, for those companies, there ar[……]

Read more

How did I Compromise an IPMS

After haivng spent two decades of days on security development in SenseTime, an A.I. company in China, I finally finished a detection system helping company find their private source codes leaked on Github. It did takes some of my effort but fortunately it works well and every morning our team can be informed by the email sent by my detection system. 

[……]

Read more

Note for SSL/TLS

Recently, I have been asked several times about what TLS is and how it works. Unfortunately, I failed to give them a detailed answers though I have learned that before. These days, I spent some time on reviewing it, and decidede to post it on my blog, hoping it will help you recall the knowledge about TLS. 

[……]

Read more