current location:Home > Technical Articles > Operation and Maintenance > Safety
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- Sample analysis of Sqlmap automated injection
- Use sqlmap to automate injection into dvwa, set the dvwa level to low, open dvwa's SQLInjection (SQLInjection(Blind)), open browser debugging, enter the userid and submit, and view the intercepted requests. You can see that it is a GET request, the url "http://192.168.1.222:8089/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#" We put it directly into salmap to test it, use the -u command -u"http ://192.168.1.22
- Safety 1194 2023-05-13 15:31:13
-
- How to use win10 remote desktop connection command
- 1. Enable local remote desktop. Through remote desktop connection, users can easily control computers in the company or other places at home. In this way, when users want to use certain functions of the company computer, they can do so at home. Of course, the company computer cannot be turned off. You also need to enable the remote connection function. If the user wants to connect to a remote computer, the computer needs to turn on the remote connection function and set the remote connection user. The setting method is as follows. 1. Open the Control Panel and click the "System" command in the pop-up window. 2. Click the "Remote Settings" text link. In the "System" window that opens, click the "Remote Settings" text link on the left side of the window. 3. Click the "Select User" button. In the pop-up "System Properties" dialog box, select "Remote"
- Safety 2329 2023-05-13 14:31:06
-
- How to implement array deduplication in Javascript
- Array deduplication 1. from() superimposed newSet() method. To deduplicate strings or numerical arrays, you can directly use the from method. varplants=['Saturn','Earth','Uranus','Mercury','Venus','Earth','Mars','Jupiter&am
- Safety 1486 2023-05-13 14:07:26
-
- How to conduct AppleJeus action analysis
- The Lazarus organization is one of the most active APT organizations currently. In 2018, Kaspersky discovered an attack campaign called AppleJeus launched by this organization. This operation is Lazarus's first attack on macOS users. In order to attack macOS users, Lazarus developed macOS malware and added an authentication mechanism. It can download the payload of the latter stage very carefully and without dropping the disk. Load the next stage payload. To attack Windows users, they developed a multi-stage infection process. After the "AppleJeus" operation analysis was released, Lazarus became more cautious when conducting attacks and adopted more methods to avoid being attacked.
- Safety 3029 2023-05-13 13:58:13
-
- How to analyze APK security and automate auditing
- 1. Small talk When it comes to mobile security, you may be unfamiliar with it, because research in this area has only gradually become popular in recent years. So what is mobile security? First of all, we know that mobile security is nothing more than some security issues on the iOS platform and Android platform, including some issues in the platform system itself and issues at the application level. Of course, some communication protocols need to be involved when the client and server interact, mainly http and https protocols, and of course some other protocols, such as websocket and so on. We won’t pay too much attention to the flaws of these protocols themselves. What we need to pay attention to is whether the data packets are encrypted when necessary during transmission, and whether the server has the right to operate the user.
- Safety 1060 2023-05-13 12:07:05
-
- How to solve the ZipperDown vulnerability
- Attack conditions for the ZipperDown security vulnerability: 1. The App uses ZipArchive2, a zip package delivered by the App is not encrypted during transmission, and the zip package is not encrypted. 3. The App uses JSPatch or other execution engines, and the local script is not encrypted. The script can be executed as long as it is placed in the specified directory, and the legality of the local script is not verified. 4. Users connect to unreliable WIFI hotspots for network communication. Methods to circumvent this vulnerability; developers' own circumvention methods: 1. Repair the SSZipArchive library , in the unzipFileAtPath decompression function, intercept the "../" string that may cause directory traversal. 2. Communication between client and server
- Safety 1086 2023-05-13 11:55:21
-
- How to understand vCenter Server and host management
- vCenterServer and host management - vCenterServer connection When using vSphereClient to connect to vCenterServer, you can manage vCenterServer and all the hosts and virtual machines it manages. 1. Run VMwarevSphereClient locally and log in as an administrator; enter the IP address or vCenterServer name; enter the Windows administrator user name ; Enter the Windows administrator password 2. When connecting to vCenter Server for the first time after installation, there is no object in the list. 2. Host management creates a data center: equivalent to a container, hosts in the same data center can do
- Safety 910 2023-05-13 11:49:13
-
- What are the javascript functions used by Baidu Maps?
- JS functions used in Baidu Map developed by javascript //Create and initialize map functions: functioninitMap(){createMap();//Create a map setMapEvent();//Set map events addMapControl();//Add controls to the map addMarker();//Add marker to the map}//Create map function: functioncreateMap(){varmap=newBMap.Map("container");//Create a map in the Baidu map container varpoint=newB
- Safety 1593 2023-05-13 11:40:06
-
- What are the differences between mesh networking and wireless bridging?
- 1. Networking mode 1. Wireless bridging is point-to-point or point-to-multipoint networking communication, which is mainly based on directional transmission. 2. Mesh means that all devices have equal status in the wireless network, and any network node can access the wired network. 2. Distance 1. Wireless bridging is mainly based on fixed point monitoring, and different antenna selections are selected according to different scenarios. 2. The characteristic of mesh is that it is very flexible in deployment. The antennas used with Mesh ad hoc network equipment are mainly omnidirectional antennas, which can quickly establish the system. 3. Transmission rate 1. The design transmission rate of the bridge is mainly 300Mbps and 866Mbps. Specifications 2. The configuration of the antenna is mainly omnidirectional antenna, which has relatively large attenuation. Therefore, the speed is not obvious compared with traditional bridges. Four, pass
- Safety 7515 2023-05-13 11:37:05
-
- Struts2-052 vulnerability example analysis
- Preface On September 5, 2017, a serious vulnerability discovered by security researchers from the foreign security research organization lgtm.com was officially released in Apache Struts2. The vulnerability number was CVE-2017-9805 (S2-052). An attacker can pass in a carefully constructed XML data, remote command execution. There is a deserialization vulnerability in the XStream component of the Struts2REST plug-in. When using the XStream component to deserialize data packets in XML format, the data content is not effectively verified, which poses a security risk and can be executed by remote commands. Exploit conditions: Using REST plugin and within the affected version range. Exploitation method: The attacker constructs malicious data packets for remote exploitation.
- Safety 1365 2023-05-13 11:25:06
-
- How to encrypt Android apk released by unity
- Security Issues of the Unity3D Program Code Security Issues The core assembly file Assembly-CSharp.dll of the Unity3D program is a standard .NET file format and comes with rich metadata information such as method names, class names, type definitions, etc. You can use tools such as DnSpy to It can be easily decompiled and tampered with, and the code logic, class names, method names, etc. can be seen at a glance. Once the code logic is decompiled, it is easy to breed various types of plug-ins and destroy the balance of the game. If there are loopholes in the code logic, it is easy to be discovered and exploited, which may cause unpredictable losses to developers. Resource security issues: During the compilation and packaging phase, the Unity3D program will package resources into AssetBun through the Unity editor.
- Safety 1623 2023-05-13 11:10:22
-
- How to use Nishang, the PowerShell penetration testing tool
- Initial PowerShell, first let's understand the concept: PowerShell can be regarded as an upgraded version of cmd (bat scripting language), which is a scripting language on the Windows platform. It is object-oriented and closely related to .NetFrameWork. It can also be thought of as the bashshell on Windows. Windows PowerShell is a command line shell and scripting environment that enables command line users and script writers to take advantage of the power of the .NET Framework. It introduces a number of very useful new concepts, further extending what you get in the Windows Command Prompt and WindowsHost environments
- Safety 1250 2023-05-13 10:58:20
-
- What is the way from XML to remote code execution
- What is XXE? Simply put, XXE is XML external entity injection. When external entities are allowed to be referenced, by constructing malicious content, it may cause harm such as arbitrary file reading, system command execution, intranet port detection, and attacks on intranet websites. For example, if the program you are currently using is PHP, you can set libxml_disable_entity_loader to TRUE to disable external entities for defense purposes. Basic exploitation usually involves an attacker injecting payload into an XML file. Once the file is executed, local files on the server will be read, and access to the internal network will be initiated to scan internal network ports. In other words, XXE is a way to reach various services locally. also,
- Safety 1318 2023-05-13 10:04:21
-
- How to conduct range practice with bee-box LDAP injection
- If the essence of sql injection is to splice strings, then the essence of everything that can be injected is to splice strings. LDAP injection is no exception as a kind of injection. What is more interesting is that it is splicing parentheses (sql injection is also concatenates parentheses, but it is more conventional to say that it concatenates strings). In the environment configuration chapter, the configuration of the ldap environment in bee-box has been discussed in great detail. The shooting range practice chapter is more about the connection process between php and ldap, the introduction of the special functions used in the middle, and some techniques for splicing parentheses. Let’s first talk about the login process of the ldap shooting range in bwapp: First, this is an LDAP login interface, the URL is http://192.168.3.184/bW
- Safety 1692 2023-05-13 09:49:05
-
- How to conduct analysis to bypass WTS-WAF
- 0x01. Looking for the target inurl:.php?id=intext: Electrical Appliances I found a website of an electrical appliances company. I tested it casually and found that there is a waf but it has not been arranged yet (I found some information and it seems that you can just add a sign instead of a space. Directly Try) 0x02. The operation found that there was no waf to intercept the data and it also said sqlmap.py-uhttp://*/*.php?id=29--tables--tamperspace2plus.py tool. I tried it and found that it could not be started. .....0x03.Hand-note http://*/*.php?id=1+and+1=1#The echo is normal http://*/*.php?id=1
- Safety 2059 2023-05-13 09:40:12