current location:Home > Technical Articles > Operation and Maintenance > Safety

  • How to do sizeof and strlen parsing
    How to do sizeof and strlen parsing
    1.strlen function. What strlen does is just a counter. It starts scanning from a certain location in the memory (it can be the beginning of the string, a location in the middle, or even an uncertain memory area) until it encounters Until the first string terminator '\0', and then return the counter value. 2. The sizeof operator sizeof() returns the amount of memory occupied by the variable after it is declared, not the actual length. In addition, sizeof is not a function, but just an operator. 3. The difference between strlen and sizeof 3.1sizeof can use types as parameters, strlen can only use char* as parameters, and must be &
    Safety 1329 2023-05-27 12:05:22
  • Example Analysis of Web Vulnerability Exploitation Postures
    Example Analysis of Web Vulnerability Exploitation Postures
    1. HTTPPUT method PUT is used for file management. If the operation and maintenance personnel have not modified the default configuration of the web server and still support these methods, they can upload files to the server file system at will. 1.1. Netcat uses the PUT method. Netcat is a very famous network tool, referred to as "NC", and is known as the "Swiss **" in penetration testing. It can be used for port monitoring, port scanning, remote file transfer, and remote shell functions. After checking that the Web service enables the PUT method, enter the following command to upload the file: ncIPPORTPUT/dav/hack.txtHTTP/1.1Host:IP Press Enter twice to see h
    Safety 1623 2023-05-27 08:55:27
  • How to use Javascript metacharacters
    How to use Javascript metacharacters
    Note 1. Metacharacters can use [a-z] to search for all letters in the alphabet. This metacharacter is more common and has an abbreviation, the eager abbreviation also contains extra characters. 2. The closest metacharacter that matches the alphabet is \w. This abbreviation is equivalent to [A-Za-z0-9_]. This character class matches uppercase and lowercase letters as well as numbers. Note that this character class also contains the underscore character (_). The example requires the use of the metacharacter \w to count the number of alphanumeric characters in all quotes. letquoteSample="Thefiveboxingwizardsjumpquickly.";letalphabetRegexV2=/c
    Safety 1594 2023-05-27 08:37:05
  • How to analyze XiaoBa ransomware variants
    How to analyze XiaoBa ransomware variants
    Overview XiaoBa ransomware is a new type of computer virus. It is a highly domestically produced ransomware virus. It is mainly spread through emails, program Trojans, and web page Trojans. This virus uses various encryption algorithms to encrypt files. The infected person generally cannot decrypt the files and must obtain the decrypted private key to crack them. If the ransom is not paid within 200 seconds, all encrypted files will be destroyed. The above description is taken from Baidu Encyclopedia, but the XiaoBa variant I analyzed does not have the above behavioral characteristics. However, it has strong concealment and infectivity, and has three main functions: file encryption, file deletion and mining. Sample analysis: This sample has been analyzed by Weibu Cloud Sandbox (see "Reference Links" for related links) and confirmed to be malicious.
    Safety 1573 2023-05-26 19:14:46
  • How to perform DLL proxy forwarding and weiquan analysis
    How to perform DLL proxy forwarding and weiquan analysis
    After DLL hijacking in the Windows 7 version, the system uses KnowDLLs to manage DLLs, which are located under the registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SessionManager\KnownDLLs. The DLL files under this will be prohibited from being called from the directory where the exe itself is located. , but can only be called from the system directory (System32) directory. But not all DLLs will be written to this registry, so DLL hijacking will occur. Use the dll generated by msfvenom to kill directly. SharpDllProxy sounds like the name
    Safety 1755 2023-05-26 18:10:33
  • Web performance test example design analysis
    Web performance test example design analysis
    First, why perform performance testing? Poorly performing applications often fail to deliver the expected benefits to the business, cost a lot of time and money, but lose credibility among users. Compared with functional testing and acceptance testing, performance testing is easily overlooked, and its importance is often realized only after performance and scalability issues are encountered after release. A website performance test case is shared. A website provides membership template download, upload, purchase, payment and other functions. It is currently entering the performance testing stage. Through the performance requirements, it can be understood that the following performance indicators need to be tested: ● Product page refresh performance ● Product upload performance ●Product download performance currently provides the following indicators: Delay: Test item response time jitter Remarks Product page refresh
    Safety 1556 2023-05-26 15:04:06
  • What are the top 10 security vulnerabilities used by APT groups?
    What are the top 10 security vulnerabilities used by APT groups?
    Overview APT attack (Advanced Persistent Threat, Advanced Persistent Threat) is a form of attack that uses advanced attack methods to conduct long-term and persistent network attacks on specific targets. The principle of APT attacks is more advanced and advanced than other attack forms. Its advanced nature is mainly reflected in precise information collection, high degree of concealment, and the use of various complex target system/application vulnerabilities. In order to have a more comprehensive understanding of the cutting-edge results of global APT research, the 360 ​​Threat Intelligence Center sorted out the most important part of APT attacks (security vulnerabilities used by APT organizations). After referring to various APT research reports and research results, Most commonly used by APT attack activities or APT organizations
    Safety 1638 2023-05-26 14:54:17
  • How to view the wifi password saved on the computer
    How to view the wifi password saved on the computer
    View the WiFi connected to the computer shwlanshowprofile View the WiFi password netshwlanshowprofilename=8888key=clear Not only that, you can also use it to view more information, such as WiFi signal strength, encryption type mac, etc. netshwlanshowall
    Safety 1909 2023-05-26 14:37:20
  • What is dynamic P2P-GRE based on IPsec?
    What is dynamic P2P-GRE based on IPsec?
    R1(config)#intf0/0R1(config-if)#ipadd12.1.1.1255.255.255.0R1(config-if)#noshR1(config-if)#exitR1(config)#intf0/1R1(config-if)#ipadd10.1.1.1255.255.255.0R1(config-if)#noshR1(config-if)#exitR1(config)#iproute0.0.0.00.0.0.012.1.1.2R3(config)#intf0/0R3(c
    Safety 871 2023-05-26 12:21:04
  • What are the basic syntaxes for xPath injection?
    What are the basic syntaxes for xPath injection?
    First, what is xPath: xPath is a language for finding information in xml. In xPath, there are seven elements of nodes: elements, attributes, text, namespaces, processing instructions, comments, and documents (root nodes). XML documents are parsed as document trees, and the root of the tree is called the document node or root node. This is the source code of a basic XML document. As can be seen from this XML source code, bookstore is the document node (root node), and book, title, author, year, and price are element nodes. The book node has four child element nodes: title, author, year, price, and the title node has three siblings: au
    Safety 1691 2023-05-26 12:01:54
  • How to achieve the transfer accuracy and in-depth analysis of 28BYJ-48 stepper motor
    How to achieve the transfer accuracy and in-depth analysis of 28BYJ-48 stepper motor
    It's turned around, but doesn't it feel a little bit wrong? too slow? Don't worry, we'll keep going. According to the principle explained at the end of this chapter, in eight-beat mode, it takes 64 rhythms for the stepper motor to rotate once. In our program, each rhythm lasts 2ms, so one revolution should be 128ms, which is 1 second. There are more than 7 turns, but why does it look like it takes more than 7 seconds to turn once? So, it’s time to understand the concept of “acceleration” in the “permanent magnet acceleration stepper motor”. Figure 9-7 is a disassembly diagram of this 28BYJ-48 stepper motor. As you can see from the picture, the white pinion in the middle is the rotor input of the stepper motor. The 64 rhythms just make this pinion It turned around, and then it drove the big light blue gear,
    Safety 1350 2023-05-26 11:53:37
  • What are the common problems in web performance testing?
    What are the common problems in web performance testing?
    1. I am currently studying JMeter. What should I start with in terms of performance in the early stages? Both Jmeter and LR are currently the preferred tools for performance testing. If you have a learning background in LR, you will get started quickly with Jmeter, focusing on understanding the concepts of threads and processes. The process is similar to that of LR. If not, from an introductory perspective, I suggest you first understand the concepts of common network protocols and operating system threads and processes. Java is ideal for Jmeter, and you can consider understanding some programming basics. PS: In fact, if you use Jmeter to learn the interface test first, you will have a better understanding of performance. 2. What preparations do I need to prepare if I am a computer hardware professional with zero foundation and want to switch to this industry? The computer hardware already possesses basic computer knowledge, and it is necessary to transfer the software
    Safety 1449 2023-05-26 11:22:55
  • What is the onion mode proxy of SQLMAP?
    What is the onion mode proxy of SQLMAP?
    Because it is necessary to conduct penetration testing on external websites, most websites have access frequency control. Once this frequency is exceeded, the IP will be banned directly. Especially when SQLMAP is running, it is even more "aunty red", and an error is reported and exited before SQLMAP is finished running. So I started to study the proxy mode of SQLMAP. SQLMAP has two proxy modes, one is a normal proxy (HTTP proxy) and the other is an onion proxy. I originally wanted to write about the application of ordinary agents, but Baidu saw that this article was detailed enough and stopped talking nonsense. Sqlmap extension - External IP proxy pool implementation Let’s focus on the onion proxy. At the beginning, when onion was used directly for injection, there was no “aunt red” report. Later, as the number of penetrated websites increased,
    Safety 1061 2023-05-26 09:56:54
  • How to encrypt Android app
    How to encrypt Android app
    one. What is Android interface hijacking? Interface hijacking means that in the Android system, malware monitors the running of the target software. When it detects that the current running interface is a specific interface of a monitored application (usually the login or payment interface), a forged pop-up Phishing page, thereby inducing users to enter information, ultimately stealing the user's privacy (maliciously stealing user account number, card number, password and other information), or using a fake interface to commit phishing fraud. two. Common attack methods: 1. Monitor the system Logocat log. Once the Activity interface switching behavior is detected, the attack will be carried out and the fake Activity interface will be covered to implement deception. 2. Monitor the system API. Once the malicious program monitors the AP of the relevant interface,
    Safety 1345 2023-05-26 08:47:19
  • How to use the Build Events feature to perform code replication
    How to use the Build Events feature to perform code replication
    The TAG security department disclosed a social engineering attack using social media such as Twitter to target security researchers engaged in vulnerability research and development at different companies and organizations. After analysis by NSFOCUS Fuying Lab, it was confirmed that the incident was targeted by the Lazarus organization. A targeted cyber attack in the cybersecurity industry, and speculation that it may have deeper attack intentions and actions. M01NTeam, the attack and countermeasures technology research team of NSFOCUS Technology, also conducted a comprehensive analysis and judgment on this incident and determined that this incident was a typical social engineering attack incident of "building plank roads openly and crossing Chencang secretly", and will also reveal the secrets of this incident in this article. A new indirect command execution attack technique used by the Lazarus organization. The Lazarus organization is a team from
    Safety 1185 2023-05-25 20:41:00

Tool Recommendations

jQuery enterprise message form contact code

jQuery enterprise message form contact code is a simple and practical enterprise message form and contact us introduction page code.
form button
2024-02-29

HTML5 MP3 music box playback effects

HTML5 MP3 music box playback special effect is an mp3 music player based on HTML5 css3 to create cute music box emoticons and click the switch button.

HTML5 cool particle animation navigation menu special effects

HTML5 cool particle animation navigation menu special effect is a special effect that changes color when the navigation menu is hovered by the mouse.
Menu navigation
2024-02-29

jQuery visual form drag and drop editing code

jQuery visual form drag and drop editing code is a visual form based on jQuery and bootstrap framework.
form button
2024-02-29

Organic fruit and vegetable supplier web template Bootstrap5

An organic fruit and vegetable supplier web template-Bootstrap5
Bootstrap template
2023-02-03

Bootstrap3 multifunctional data information background management responsive web page template-Novus

Bootstrap3 multifunctional data information background management responsive web page template-Novus
backend template
2023-02-02

Real estate resource service platform web page template Bootstrap5

Real estate resource service platform web page template Bootstrap5
Bootstrap template
2023-02-02

Simple resume information web template Bootstrap4

Simple resume information web template Bootstrap4
Bootstrap template
2023-02-02

Cute summer elements vector material (EPS PNG)

This is a cute summer element vector material, including the sun, sun hat, coconut tree, bikini, airplane, watermelon, ice cream, ice cream, cold drink, swimming ring, flip-flops, pineapple, conch, shell, starfish, crab, Lemons, sunscreen, sunglasses, etc., the materials are provided in EPS and PNG formats, including JPG previews.
PNG material
2024-05-09

Four red 2023 graduation badges vector material (AI EPS PNG)

This is a red 2023 graduation badge vector material, four in total, available in AI, EPS and PNG formats, including JPG preview.
PNG material
2024-02-29

Singing bird and cart filled with flowers design spring banner vector material (AI EPS)

This is a spring banner vector material designed with singing birds and a cart full of flowers. It is available in AI and EPS formats, including JPG preview.
banner picture
2024-02-29

Golden graduation cap vector material (EPS PNG)

This is a golden graduation cap vector material, available in EPS and PNG formats, including JPG preview.
PNG material
2024-02-27

Home Decor Cleaning and Repair Service Company Website Template

Home Decoration Cleaning and Maintenance Service Company Website Template is a website template download suitable for promotional websites that provide home decoration, cleaning, maintenance and other service organizations. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-05-09

Fresh color personal resume guide page template

Fresh color matching personal job application resume guide page template is a personal job search resume work display guide page web template download suitable for fresh color matching style. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-29

Designer Creative Job Resume Web Template

Designer Creative Job Resume Web Template is a downloadable web template for personal job resume display suitable for various designer positions. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28

Modern engineering construction company website template

The modern engineering and construction company website template is a downloadable website template suitable for promotion of the engineering and construction service industry. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28