Cytosineの有被小窝~
悟已往之不谏,知来者之可追。
2020-11-12T15:51:51.000Z
https://lovegood.github.io/
Cytosine
Hexo
利用LD_PRELOAD bypass disable_function
https://lovegood.github.io/2020/11/12/LD-PRELOAD-bypass-disable-function-in-ctf/
2020-11-12T14:45:22.000Z
2020-11-12T15:51:51.000Z
<p>上一篇翻译中讲述了用LD_PRELOAD劫持系统的rand()函数,使rand()函数永远<code>return 42</code>,算是简单介绍了原理。</p>
<p>在这一篇中,我们把这个思想再深入一点,讲讲CTF中常见的利用LD_PRELOAD来bypass
[翻译]不再随机:使用LD_PRELOAD来劫持rand()函数
https://lovegood.github.io/2020/11/12/translation-NOT-SO-RANDOM/
2020-11-12T10:21:37.000Z
2020-11-12T12:45:37.000Z
<p>文章比较基础,但是一步一步讲得很详细,适合第一次接触使用LD_PRELOAD来劫持函数的朋友~</p>
<p>原文地址:<a
Mac下配置JAVA_HOME(Java自动更新的目录)
https://lovegood.github.io/2020/08/24/mac-java-home-update/
2020-08-24T10:39:56.000Z
2020-08-24T10:52:54.000Z
<p>今天想调一个JAVA程序,报错,搜了一下是由于Mac
Mac下配置phpstorm+xdebug+docker(vmware虚拟机)进行断点调试
https://lovegood.github.io/2020/07/02/config-mac-phpstorm-xdebug-docker-vmware-ubuntu/
2020-07-02T12:58:27.000Z
2020-07-03T15:30:07.000Z
<h1 id="环境说明"><a href="#环境说明" class="headerlink" title="环境说明"></a>环境说明</h1><p>本机Mac,安装PHPstorm,借助xdebug,远程调试位于VMware虚拟机(Ubuntu
如何写一个基本兼容python2和python3的程序?
https://lovegood.github.io/2020/01/09/how-to-write-a-program-compatible-with-python2-and-python3/
2020-01-08T17:16:17.000Z
2020-01-08T17:26:12.000Z
<h1 id="先从四个函数开始"><a href="#先从四个函数开始" class="headerlink" title="先从四个函数开始"></a>先从四个函数开始</h1><p>看 <a
[翻译+笔记]nsec2018-JS原型链污染攻击
https://lovegood.github.io/2019/04/16/translation-js-prototype-pollution-attack-nsec2018/
2019-04-16T00:49:06.000Z
2019-04-16T05:19:12.000Z
<p>读完p牛的 <a href="https://www.leavesongs.com/PENETRATION/javascript-prototype-pollution-attack.html" target="_blank" rel="external">深入理解
推荐插件,octotree,树形展示Github仓库代码
https://lovegood.github.io/2019/04/13/tools-browser-extension-octotree/
2019-04-13T12:48:37.000Z
2019-04-13T12:52:46.000Z
<p>效果:</p>
<p><img src="00.png" alt=""></p>
<p>GitHub仓库&安装方法:</p>
<p><a href="https://github.com/ovity/octotree" target="_blank"
[XSS笔记]乌云白帽子心伤的瘦子-21个鹅厂XSS案例
https://lovegood.github.io/2019/04/08/note-xss-0-xinshangdeshouzi-cases/
2019-04-08T12:20:58.000Z
2019-04-09T05:40:48.000Z
<p>@心伤的瘦子 的21个鹅厂XSS案例,从反射型XSS到DOM XSS再到Flash
浅述反弹shell
https://lovegood.github.io/2019/03/30/reverse-shell-simple/
2019-03-30T13:44:29.000Z
2021-06-23T07:09:22.000Z
<h1 id="什么是反弹shell"><a href="#什么是反弹shell" class="headerlink"
[翻译]DOM-XSS/第三种XSS——看一下被忽视的XSS
https://lovegood.github.io/2019/03/22/translation-DOM-Based-Cross-Site-Scripting-or-XSS-of-the-Third-Kind/
2019-03-22T11:55:48.000Z
2019-03-30T05:47:53.000Z
<p>原文地址:<a href="http://www.webappsec.org/projects/articles/071105.html" target="_blank"
hexo报错:can not read a block mapping entry
https://lovegood.github.io/2018/12/23/solution-hexo-can-not-read-a-block-mapping-entry/
2018-12-23T09:30:18.000Z
2018-12-23T09:43:08.000Z
<p>hexo生成时出现错误:</p>
<p>YAMLException: can not read a block mapping entry; a multiline key may not be an implicit key at line 2, column
flask遇到unicodeencodeerror
https://lovegood.github.io/2018/12/23/solution-flask-unicodeencodeerror/
2018-12-23T09:00:11.000Z
2019-01-04T08:00:47.000Z
<h1 id="错误"><a href="#错误" class="headerlink" title="错误"></a>错误</h1><p>unicodeencodeerror ‘ascii’ codec can’t encode characters in position
Ubuntu 18.04,WiFi没有适配器的解决方法
https://lovegood.github.io/2018/12/11/installation-ubuntu18-04-no-wifi-Adapter/
2018-12-11T02:52:15.000Z
2018-12-11T04:11:34.000Z
<p>网上搜的解决方案都不能完全解决问题,参考了好几篇文章,然后自己琢磨了下,写出来的,如果有问题,欢迎联系窝。</p>
<p>直接安装驱动会提示缺少依赖,想要apt-get
ctf-qq-group-challenge-writeup-web-and-misc
https://lovegood.github.io/2018/12/08/writeup-ctf-qq-group-challenge-web-and-misc/
2018-12-08T03:20:46.000Z
2020-07-25T07:13:13.000Z
<p>CTF学习交流群(群号
writeup-2018Hackergame
https://lovegood.github.io/2018/10/09/writeup-2018Hackergame/
2018-10-09T04:20:58.000Z
2018-10-09T05:23:16.000Z
<h1 id="签到题"><a href="#签到题" class="headerlink" title="签到题"></a>签到题</h1><p>审查元素,修改长度限制,输入’hackergame2018’,得到flag</p>
<p><img src="0.png"
2018网鼎杯部分WriteUp
https://lovegood.github.io/2018/08/21/writeup-2018wangdingbei/
2018-08-21T06:45:35.000Z
2018-08-21T14:28:29.000Z
<h1 id="Misc-签到"><a href="#Misc-签到" class="headerlink" title="Misc 签到"></a>Misc 签到</h1><p><img src="Misc-checkin.jpg"
i春秋CTF大本营 百度杯2017年2月 Web WriteUp
https://lovegood.github.io/2018/08/19/writeup-ichunqiu-baidubei-201702-web/
2018-08-19T06:45:35.000Z
2018-08-19T15:53:10.000Z
<p><img src="all.png" alt=""></p>
<h1 id="爆破-1"><a href="#爆破-1" class="headerlink" title="爆破-1"></a>爆破-1</h1><p>challenge:</p>
<figure
Python-NumPy-Usage
https://lovegood.github.io/2018/08/16/note-python-numpy-usage/
2018-08-16T09:54:00.000Z
2018-08-16T09:58:20.000Z
<h1 id="NumPy基本使用"><a href="#NumPy基本使用" class="headerlink" title="NumPy基本使用"></a>NumPy基本使用</h1><figure class="highlight
2$——printf中的语法糖
https://lovegood.github.io/2018/08/16/c-printf-syntactic-sugar/
2018-08-16T02:00:11.000Z
2018-10-06T13:29:57.000Z
<p>code:</p>
<figure class="highlight plain"><table><tr><td class="gutter"><pre><div class="line">1</div><div class="line">2</div><div
《缓冲区溢出分析》课程笔记
https://lovegood.github.io/2018/08/14/note-pwn-first-stackoverflow-analysis/
2018-08-14T04:48:03.000Z
2019-03-30T06:13:05.000Z
<p><a href="https://www.ichunqiu.com/course/147" target="_blank" rel="external">https://www.ichunqiu.com/course/147</a>