current location:Home > Technical Articles > Operation and Maintenance > Safety
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- How to do sizeof and strlen parsing
- 1.strlen function. What strlen does is just a counter. It starts scanning from a certain location in the memory (it can be the beginning of the string, a location in the middle, or even an uncertain memory area) until it encounters Until the first string terminator '\0', and then return the counter value. 2. The sizeof operator sizeof() returns the amount of memory occupied by the variable after it is declared, not the actual length. In addition, sizeof is not a function, but just an operator. 3. The difference between strlen and sizeof 3.1sizeof can use types as parameters, strlen can only use char* as parameters, and must be &
- Safety 1329 2023-05-27 12:05:22
-
- Example Analysis of Web Vulnerability Exploitation Postures
- 1. HTTPPUT method PUT is used for file management. If the operation and maintenance personnel have not modified the default configuration of the web server and still support these methods, they can upload files to the server file system at will. 1.1. Netcat uses the PUT method. Netcat is a very famous network tool, referred to as "NC", and is known as the "Swiss **" in penetration testing. It can be used for port monitoring, port scanning, remote file transfer, and remote shell functions. After checking that the Web service enables the PUT method, enter the following command to upload the file: ncIPPORTPUT/dav/hack.txtHTTP/1.1Host:IP Press Enter twice to see h
- Safety 1623 2023-05-27 08:55:27
-
- How to use Javascript metacharacters
- Note 1. Metacharacters can use [a-z] to search for all letters in the alphabet. This metacharacter is more common and has an abbreviation, the eager abbreviation also contains extra characters. 2. The closest metacharacter that matches the alphabet is \w. This abbreviation is equivalent to [A-Za-z0-9_]. This character class matches uppercase and lowercase letters as well as numbers. Note that this character class also contains the underscore character (_). The example requires the use of the metacharacter \w to count the number of alphanumeric characters in all quotes. letquoteSample="Thefiveboxingwizardsjumpquickly.";letalphabetRegexV2=/c
- Safety 1594 2023-05-27 08:37:05
-
- How to analyze XiaoBa ransomware variants
- Overview XiaoBa ransomware is a new type of computer virus. It is a highly domestically produced ransomware virus. It is mainly spread through emails, program Trojans, and web page Trojans. This virus uses various encryption algorithms to encrypt files. The infected person generally cannot decrypt the files and must obtain the decrypted private key to crack them. If the ransom is not paid within 200 seconds, all encrypted files will be destroyed. The above description is taken from Baidu Encyclopedia, but the XiaoBa variant I analyzed does not have the above behavioral characteristics. However, it has strong concealment and infectivity, and has three main functions: file encryption, file deletion and mining. Sample analysis: This sample has been analyzed by Weibu Cloud Sandbox (see "Reference Links" for related links) and confirmed to be malicious.
- Safety 1573 2023-05-26 19:14:46
-
- How to perform DLL proxy forwarding and weiquan analysis
- After DLL hijacking in the Windows 7 version, the system uses KnowDLLs to manage DLLs, which are located under the registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SessionManager\KnownDLLs. The DLL files under this will be prohibited from being called from the directory where the exe itself is located. , but can only be called from the system directory (System32) directory. But not all DLLs will be written to this registry, so DLL hijacking will occur. Use the dll generated by msfvenom to kill directly. SharpDllProxy sounds like the name
- Safety 1755 2023-05-26 18:10:33
-
- Web performance test example design analysis
- First, why perform performance testing? Poorly performing applications often fail to deliver the expected benefits to the business, cost a lot of time and money, but lose credibility among users. Compared with functional testing and acceptance testing, performance testing is easily overlooked, and its importance is often realized only after performance and scalability issues are encountered after release. A website performance test case is shared. A website provides membership template download, upload, purchase, payment and other functions. It is currently entering the performance testing stage. Through the performance requirements, it can be understood that the following performance indicators need to be tested: ● Product page refresh performance ● Product upload performance ●Product download performance currently provides the following indicators: Delay: Test item response time jitter Remarks Product page refresh
- Safety 1556 2023-05-26 15:04:06
-
- What are the top 10 security vulnerabilities used by APT groups?
- Overview APT attack (Advanced Persistent Threat, Advanced Persistent Threat) is a form of attack that uses advanced attack methods to conduct long-term and persistent network attacks on specific targets. The principle of APT attacks is more advanced and advanced than other attack forms. Its advanced nature is mainly reflected in precise information collection, high degree of concealment, and the use of various complex target system/application vulnerabilities. In order to have a more comprehensive understanding of the cutting-edge results of global APT research, the 360 Threat Intelligence Center sorted out the most important part of APT attacks (security vulnerabilities used by APT organizations). After referring to various APT research reports and research results, Most commonly used by APT attack activities or APT organizations
- Safety 1638 2023-05-26 14:54:17
-
- How to view the wifi password saved on the computer
- View the WiFi connected to the computer shwlanshowprofile View the WiFi password netshwlanshowprofilename=8888key=clear Not only that, you can also use it to view more information, such as WiFi signal strength, encryption type mac, etc. netshwlanshowall
- Safety 1909 2023-05-26 14:37:20
-
- What is dynamic P2P-GRE based on IPsec?
- R1(config)#intf0/0R1(config-if)#ipadd12.1.1.1255.255.255.0R1(config-if)#noshR1(config-if)#exitR1(config)#intf0/1R1(config-if)#ipadd10.1.1.1255.255.255.0R1(config-if)#noshR1(config-if)#exitR1(config)#iproute0.0.0.00.0.0.012.1.1.2R3(config)#intf0/0R3(c
- Safety 871 2023-05-26 12:21:04
-
- What are the basic syntaxes for xPath injection?
- First, what is xPath: xPath is a language for finding information in xml. In xPath, there are seven elements of nodes: elements, attributes, text, namespaces, processing instructions, comments, and documents (root nodes). XML documents are parsed as document trees, and the root of the tree is called the document node or root node. This is the source code of a basic XML document. As can be seen from this XML source code, bookstore is the document node (root node), and book, title, author, year, and price are element nodes. The book node has four child element nodes: title, author, year, price, and the title node has three siblings: au
- Safety 1691 2023-05-26 12:01:54
-
- How to achieve the transfer accuracy and in-depth analysis of 28BYJ-48 stepper motor
- It's turned around, but doesn't it feel a little bit wrong? too slow? Don't worry, we'll keep going. According to the principle explained at the end of this chapter, in eight-beat mode, it takes 64 rhythms for the stepper motor to rotate once. In our program, each rhythm lasts 2ms, so one revolution should be 128ms, which is 1 second. There are more than 7 turns, but why does it look like it takes more than 7 seconds to turn once? So, it’s time to understand the concept of “acceleration” in the “permanent magnet acceleration stepper motor”. Figure 9-7 is a disassembly diagram of this 28BYJ-48 stepper motor. As you can see from the picture, the white pinion in the middle is the rotor input of the stepper motor. The 64 rhythms just make this pinion It turned around, and then it drove the big light blue gear,
- Safety 1350 2023-05-26 11:53:37
-
- What are the common problems in web performance testing?
- 1. I am currently studying JMeter. What should I start with in terms of performance in the early stages? Both Jmeter and LR are currently the preferred tools for performance testing. If you have a learning background in LR, you will get started quickly with Jmeter, focusing on understanding the concepts of threads and processes. The process is similar to that of LR. If not, from an introductory perspective, I suggest you first understand the concepts of common network protocols and operating system threads and processes. Java is ideal for Jmeter, and you can consider understanding some programming basics. PS: In fact, if you use Jmeter to learn the interface test first, you will have a better understanding of performance. 2. What preparations do I need to prepare if I am a computer hardware professional with zero foundation and want to switch to this industry? The computer hardware already possesses basic computer knowledge, and it is necessary to transfer the software
- Safety 1449 2023-05-26 11:22:55
-
- What is the onion mode proxy of SQLMAP?
- Because it is necessary to conduct penetration testing on external websites, most websites have access frequency control. Once this frequency is exceeded, the IP will be banned directly. Especially when SQLMAP is running, it is even more "aunty red", and an error is reported and exited before SQLMAP is finished running. So I started to study the proxy mode of SQLMAP. SQLMAP has two proxy modes, one is a normal proxy (HTTP proxy) and the other is an onion proxy. I originally wanted to write about the application of ordinary agents, but Baidu saw that this article was detailed enough and stopped talking nonsense. Sqlmap extension - External IP proxy pool implementation Let’s focus on the onion proxy. At the beginning, when onion was used directly for injection, there was no “aunt red” report. Later, as the number of penetrated websites increased,
- Safety 1061 2023-05-26 09:56:54
-
- How to encrypt Android app
- one. What is Android interface hijacking? Interface hijacking means that in the Android system, malware monitors the running of the target software. When it detects that the current running interface is a specific interface of a monitored application (usually the login or payment interface), a forged pop-up Phishing page, thereby inducing users to enter information, ultimately stealing the user's privacy (maliciously stealing user account number, card number, password and other information), or using a fake interface to commit phishing fraud. two. Common attack methods: 1. Monitor the system Logocat log. Once the Activity interface switching behavior is detected, the attack will be carried out and the fake Activity interface will be covered to implement deception. 2. Monitor the system API. Once the malicious program monitors the AP of the relevant interface,
- Safety 1345 2023-05-26 08:47:19
-
- How to use the Build Events feature to perform code replication
- The TAG security department disclosed a social engineering attack using social media such as Twitter to target security researchers engaged in vulnerability research and development at different companies and organizations. After analysis by NSFOCUS Fuying Lab, it was confirmed that the incident was targeted by the Lazarus organization. A targeted cyber attack in the cybersecurity industry, and speculation that it may have deeper attack intentions and actions. M01NTeam, the attack and countermeasures technology research team of NSFOCUS Technology, also conducted a comprehensive analysis and judgment on this incident and determined that this incident was a typical social engineering attack incident of "building plank roads openly and crossing Chencang secretly", and will also reveal the secrets of this incident in this article. A new indirect command execution attack technique used by the Lazarus organization. The Lazarus organization is a team from
- Safety 1185 2023-05-25 20:41:00