current location:Home > Technical Articles > Operation and Maintenance > Safety
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- How Codeql analyzes the problem of cookie not enabling httponly
- Preface Today we use codeql to analyze security issues such as "cookie is not enabled httponly", thereby deepening our use of codeql. If the response is good, you can consider exploring other vulnerabilities in Vulnerability-goapp. When analyzing go programs, you must additionally download the codeql-go description audit object Vulnerability-goapp: VulnerablegolangWebapplicationforeducation. Modification: Because all cookies in this project are not set to http-only, there is no comparison, so we need to modify it first. in some cookies
- Safety 1296 2023-05-17 17:25:59
-
- DeRPnStiNK target machine penetration case analysis
- DeRPnStiNK target machine penetration We found the DeRPnStiNK target machine from the Internet as an experimental environment. For beginners, we used this target machine to conduct penetration experiments. After downloading the target machine online, open it directly through the virtual machine. Just use the default bridge mode for the network card configuration. Note here that your kali attack machine must also be in bridge mode to ensure normal communication with the attacked server. First, if we are not sure about the address of the attacked server, we need to perform host discovery and check our own IP address: 192.168.50.76, as shown in the figure: Use nmap or netdiscover to perform network discovery. The command is as follows: nmap–sP192.168.50 .0/24(
- Safety 1598 2023-05-17 16:56:36
-
- How to upgrade NetScaler version
- 1. NetScaler version upgrade instructions requirements: Upgrade NetScaler through shell mode [Topology] 2. Preparation before upgrading Prepare the version files required for version upgrade Use a browser to open https://www.citrix.com/downloads/netscaler-adc/ to log in Then select the required upgrade package for DownLoad, select the tgz upgrade package, and prepare the necessary tools required for version upgrade. 3. During the upgrade process, use the SSH tool to log in to NetScaler to view the current version information. Use the SFTP tool to upload the upgrade package to NetScaler's /var/nsinstall/build- 11.1-54.14 Directory
- Safety 1638 2023-05-17 16:52:23
-
- How to analyze Apache Dubbo deserialization vulnerability
- Introduction Dubbo is a high-performance and excellent service framework open sourced by Alibaba, which enables applications to realize service output and input functions through high-performance RPC, and can be seamlessly integrated with the Spring framework. It provides three core capabilities: interface-oriented remote method invocation, intelligent fault tolerance and load balancing, and automatic service registration and discovery. Overview On June 23, 2020, ApacheDubbo officially released a risk notice about ApacheDubbo remote code execution. The vulnerability number is CVE-2020-1948, and the vulnerability level is: high risk. ApacheDubbo is a high-performance, lightweight open source JavaRPC framework. It provides three core capabilities: interface-oriented remote
- Safety 1075 2023-05-17 16:01:22
-
- What is wide byte injection in SQL injection?
- Wide byte injection: It is a way to bypass SQL injection. 1. Wide byte concept: 1. Single-byte character set: all characters are represented by one byte, such as ASCII encoding (0-127) 2 . Multi-byte character set: In a multi-byte character set, some bytes are represented by multiple bytes, and another part (possibly none) is represented by a single byte. 3. UTF-8 encoding: It is an encoding method (multi-byte encoding). It can use 1 to 4 bytes to represent a symbol, and the byte length changes according to different symbols. 4. Common wide bytes: GB2312, GBK, GB18030, BIG5, Shift_JISGB2312 does not have wide byte injection, and it can be collected that there is wide byte injection
- Safety 1619 2023-05-17 15:37:14
-
- What are the optical module configurations and switch levels that need to be paid attention to?
- Today I will explain to you what configurations of fiber optic port modules you need to pay attention to when purchasing a fiber optic switch? Yitianguang Communications first tells everyone that it will be clear as long as you remember the following points, which means aligning according to the port of the switch. From large to small, the first is 10G port SFP+, 10GBase-SR 10G optical module, wavelength 850nm, multi-mode 300mSFP+, 10GBase-LR 10G optical module, wavelength 1310nm or 1550nm, single mode 10/20/40/60/80km Then there are the Gigabit port dual fiber 50/125 micron multimode, wavelength 850nm, 550m; dual fiber 62.5/125 micron multimode, wavelength 850nm, 275m; dual fiber single mode
- Safety 1698 2023-05-17 15:19:11
-
- How to match specific quantity in javascript
- Note 1. The number of curly bracket specifiers can be used to specify the upper and lower limits of the matching pattern. But sometimes only a specific number of matches is needed. 2. To specify a certain number of matching patterns, just place a number between the curly brackets. The example requires modifying the regular expression timRegex to match the word Timber with only four letters m. lettimStr="Timmmmber";lettimRegex=/change/;//Modify this line letresult=timRegex.test(timStr);Reference lettimStr="Timmmmber";lettimRegex
- Safety 1269 2023-05-17 15:19:06
-
- Example analysis of Apache Commons Collections deserialization vulnerability
- 1. Introduction Although there are many articles on the Internet that analyze the deserialization vulnerability of this component, I still record it here. After all, this is significant for the development of Java deserialization vulnerabilities. Apache Commons Collections is a very commonly used tool library in Java application development. It adds many powerful data structures, simplifies the development of Java applications, and has become a recognized standard for Java to process collection data. Many common applications such as Weblogic, WebSphere, Jboss, Jenkins, etc. all use the Apache Commons Collections tool library. When a deserialization vulnerability occurs in the tool library, this
- Safety 1852 2023-05-17 15:10:34
-
- How to perform Cisco ASA5505 password recovery
- 官方文档说明:Torecoverfromthelossofpasswords,performthefollowingsteps:Step1ConnecttothesecurityapplianceconsoleportbysuperterminalStep2Poweroffthesecurityappliance,andthenpoweriton.Step3Duringthestartupmessages,presstheEscapekeywhenpromptedtoenterROMMON.St
- Safety 1708 2023-05-17 14:52:21
-
- How to encrypt files in Linux system
- Choosing to use EFS when installing a Linux system will first introduce a very simple method to use the EFS file system. Taking Fedora's installation steps as an example, you can easily use it by selecting the relevant options for installation. Users can create new partitions in free space, select a partition for editing, and delete certain partitions. In Figure 1, you need to select the [Encrypt File System] option, and enter the password required to access EFS according to the system requirements, as shown in Figure 2. Next, follow the Linux installation steps step by step and follow the system prompts to install the system. Then, after successfully installing the system, the user will have a secure encrypted file system, and every time he logs in to the system, the system
- Safety 1499 2023-05-17 14:34:40
-
- Example analysis of Google Chrome 85 fixing WebGL code execution vulnerability
- Google has fixed a use-after-free vulnerability in the WebGL (WebGraphicsLibrary) component of the Google Chrome web browser. By successfully exploiting this vulnerability, an attacker can execute arbitrary code in the context of the browser's process. WebGL is a JavaScript API that compliant browsers use to render interactive 2D and 3D graphics without the use of plug-ins. GoogleChrome85.0.4149.0 has fixed this code execution vulnerability. High-risk code execution vulnerability The code execution vulnerability discovered by CiscoTalos senior research engineer Marcin Towalski is numbered CVE-2020-649
- Safety 1211 2023-05-17 14:07:14
-
- NAT configuration in USG firewall
- USG firewall NAT configuration learning purpose Master the method of configuring NATServer on the USG firewall Master the method of configuring NATEasyIP on the USG firewall Topology diagram scenario: You are the network administrator of the company. The company is segregated into three zones using network firewalls. Now we need to publish the telnet service provided by a server (IP address: 10.0.3.3) in the DMZ area. The public addresses are 10.0.10.20 and 24. And users in the internal network Trust area access through Easy-IP. outside area. Access from other directions is prohibited. Define the G0/0/1 and G0/0/21 interfaces to vlan11 on the switch, and assign G0/0/
- Safety 1445 2023-05-17 13:25:47
-
- Example analysis of using nmap-converter to convert nmap scan result XML into XLS
- Use nmap-converter to convert nmap scan result XML to XLS. Practical 1. Introduction As a network security practitioner, sometimes you need to use the port scanning tool nmap to perform large-volume port scanning, but the output results of Nmap are .nmap, .xml and .gnmap The three formats are mixed with a lot of unnecessary information, which is very inconvenient to process. The output results are converted into Excel tables to process the later output. Therefore, a technical expert shared a Python script to convert nmap reports to XLS. 2. nmap-converter1) Project address: https://github.com/mrschyte/nmap-
- Safety 1800 2023-05-17 13:04:19
-
- Example analysis of Nmap operations
- Background With the development of the security industry, the country attaches great importance to it. Various industries suffer from various threats. Some companies of Party A do not have relevant security departments or have relatively weak security capabilities, so they will hire Party B's security personnel to provide operational services. Then Party B's security engineers need to help customers deal with some security events that occur during business operations. For example, after a vulnerability occurs, our security engineers need to detect whether other business systems have the vulnerability and whether it needs to be repaired in time. We also need to output some results to facilitate customer reporting, as well as how to improve work efficiency, etc. Review of common parameter options for efficient scanning Fast live scanning nmap-T4-n-V–sn-iLip.txt-oNlive_host.
- Safety 1054 2023-05-17 12:22:18
-
- What are the steps you need to pay attention to in H3C wireless configuration?
- The first step is to pay attention to the wireless control version. If the version is very old, it may not have the current wireless AP model and needs to be upgraded to the officially recommended version. The second step is to apply for wireless controller license and register on the H3C official website. The device file needs to be in Check the location of the file through displaylicescedevice-id on the wireless controller, then download the file through FTP or TFTP, and upload it to the location that needs to be registered. The third step is to register the three-layer wireless ap. You need to configure the option 43 option.
- Safety 1501 2023-05-17 10:40:06