Pikachu vulnerability range series brute force cracking

Foreword This is the first article in the Pikachu vulnerability shooting range series~~ (it should be serialized)~~. First, let’s briefly introduce the Pikachu shooting range. This shooting range was developed by Chinese people and is purely in Chinese. If you encounter difficulties during practice, you can check the tips. There are also supporting learning videos. […]

pikachu – file inclusion, download and upload

File Inclusion (File Inclusion Vulnerability) Overview File inclusion is a function. Built-in file inclusion functions are provided in various development languages, which allow developers to directly include (introduce) another code file into one code file. For example, in PHP, it provides: include(), include_once() require(), require_once() These files contain functions, which are frequently used in code […]

Shooting range environment construction [XP, pikachu, dvwa, sqli-labs]

1. Foreword In the process of learning network security skills, there are many skill points that require practical exercises. At this time, we need an environment and a practice range that we are familiar with, ranging from simple to difficult. This article introduces the shooting range environment tool phpStudy, and three commonly used shooting ranges: […]

pikachu-SQL injection

SQL-inject 1. Digital injection type (POST) Just choose a number to query: It is found that two data are returned, one is the name and the other is the address. So we judge that the website SQL statement should be: $query=”select username,email from member where id=$id” So we can construct the statement: select username,email from […]

SQL injection—-pikachu shooting range

The principle of SQL injection select * from users where username = ‘username’, password = ‘password’ ; After modification select * from users where username = ‘username ‘ or 1=1 — + ‘, password = ‘password’ ; Types of SQL injection All injections need to first determine the closing method, common numeric and character types […]

Pikachu Range – Cross-Site Request Forgery (CSRF)

Article directory 1. Cross-site request forgery (CSRF) 1.1 CSRF(get) 1.2 CSRF(post) 1.3 CSRF Token 1.4 CSRF vulnerability defense 1. Cross-site request forgery (CSRF) You can also refer to my other article: Cross-site request forgery (CSRF) The full name is Cross-site request forgery, which translates as cross-site request forgery. It refers to using the victim’s identity […]

Pikachu Range – File Inclusion Vulnerability

Article directory 1. File Inclusion 1.2 File Inclusion(local) 1.2.1 Source code analysis 1.2.2 Vulnerability Defense 1.3 File Inclusion(remote) 1.3.1 Source code analysis 1.3.2 Vulnerability defense 1.4 File Contains Vulnerability Defense 1. File Inclusion You can also refer to my other article: File Contains Vulnerabilities and Vulnerability Reproduction. File Inclusion (file inclusion vulnerability) overview: File inclusion […]

Pikachu XSS (cross-site scripting attack)

Article directory Cross-Site Scripting XSS (cross-site scripting) overview Reflective type [xss](https://so.csdn.net/so/search?q=xss & amp;spm=1001.2101.3001.7020)(get) Reflective xss(post) Stored xss DOM type xss DOM type xss-x xss-touch typing xss-filter htmlspecialchars of xss href output of xss js output of xss Cross-Site Scripting XSS (cross-site scripting) overview ? Cross-Site Scripting is abbreviated as “CSS”. In order to avoid conflict […]