Skip to content

Commit 228c052

Browse files
committed
first commit
0 parents  commit 228c052

File tree

1 file changed

+50
-0
lines changed

1 file changed

+50
-0
lines changed

Readme.md

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
代码注入、命令执行
2+
3+
1.内置危险函数
4+
exec
5+
execfile
6+
eval
7+
Python eval的常见错误封装及利用原理
8+
http://xxlegend.com/2015/07/31/Python%20eval%E7%9A%84%E5%B8%B8%E8%A7%81%E9%94%99%E8%AF%AF%E5%B0%81%E8%A3%85%E5%8F%8A%E5%88%A9%E7%94%A8%E5%8E%9F%E7%90%86/
9+
Exploiting Python’s Eval
10+
http://www.floyd.ch/?p=584
11+
2.标准库危险模块
12+
os
13+
os.popen() or subprocess.Popen(), and subprocess.check_output()
14+
核心语句
15+
sys
16+
subprocess
17+
subprocess.call(user_input, shell=True) : popen, subprocess.call等函数所导致的命令执行
18+
commands
19+
3.危险第三方库
20+
Template(user_input) : 模板注入(SSTI)所产生的代码执行
21+
subprocess32
22+
4.反序列化
23+
marshal
24+
PyYAML
25+
pickle和cpickle
26+
http://www.cnblogs.com/yyds/p/6563608.html
27+
shelve
28+
PIL
29+
https://xianzhi.aliyun.com/forum/read/2163.html
30+
图片库REC
31+
https://sethsec.blogspot.jp/2016/11/exploiting-python-code-injection-in-web.html
32+
命令注入
33+
unzip
34+
https://ajinabraham.com/blog/exploiting-insecure-file-extraction-in-python-for-code-execution
35+
payload构造
36+
前提
37+
eval+compile
38+
多语句
39+
__import__
40+
__import__是一个函数,并且只接受字符串参数,import 都是在它的基础上实现的。
41+
importlib
42+
参考
43+
import相关,沙箱绕过
44+
https://xianzhi.aliyun.com/forum/read/2138.html
45+
代码注入
46+
https://www.doyler.net/security-not-included/exploiting-python-code-injection
47+
http://www.securitynewspaper.com/2016/11/12/exploiting-python-code-injection-web-applications/
48+
codereview
49+
Python Security Auditing (IV): Command Execution
50+
https://www.cdxy.me/?p=747

0 commit comments

Comments
 (0)