current location:Home > Technical Articles > Operation and Maintenance > Safety

  • Sample analysis of Sqlmap automated injection
    Sample analysis of Sqlmap automated injection
    Use sqlmap to automate injection into dvwa, set the dvwa level to low, open dvwa's SQLInjection (SQLInjection(Blind)), open browser debugging, enter the userid and submit, and view the intercepted requests. You can see that it is a GET request, the url "http://192.168.1.222:8089/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#" We put it directly into salmap to test it, use the -u command -u"http ://192.168.1.22
    Safety 1194 2023-05-13 15:31:13
  • How to use win10 remote desktop connection command
    How to use win10 remote desktop connection command
    1. Enable local remote desktop. Through remote desktop connection, users can easily control computers in the company or other places at home. In this way, when users want to use certain functions of the company computer, they can do so at home. Of course, the company computer cannot be turned off. You also need to enable the remote connection function. If the user wants to connect to a remote computer, the computer needs to turn on the remote connection function and set the remote connection user. The setting method is as follows. 1. Open the Control Panel and click the "System" command in the pop-up window. 2. Click the "Remote Settings" text link. In the "System" window that opens, click the "Remote Settings" text link on the left side of the window. 3. Click the "Select User" button. In the pop-up "System Properties" dialog box, select "Remote"
    Safety 2329 2023-05-13 14:31:06
  • How to implement array deduplication in Javascript
    How to implement array deduplication in Javascript
    Array deduplication 1. from() superimposed newSet() method. To deduplicate strings or numerical arrays, you can directly use the from method. varplants=['Saturn','Earth','Uranus','Mercury','Venus','Earth','Mars','Jupiter&am
    Safety 1486 2023-05-13 14:07:26
  • How to conduct AppleJeus action analysis
    How to conduct AppleJeus action analysis
    The Lazarus organization is one of the most active APT organizations currently. In 2018, Kaspersky discovered an attack campaign called AppleJeus launched by this organization. This operation is Lazarus's first attack on macOS users. In order to attack macOS users, Lazarus developed macOS malware and added an authentication mechanism. It can download the payload of the latter stage very carefully and without dropping the disk. Load the next stage payload. To attack Windows users, they developed a multi-stage infection process. After the "AppleJeus" operation analysis was released, Lazarus became more cautious when conducting attacks and adopted more methods to avoid being attacked.
    Safety 3029 2023-05-13 13:58:13
  • How to analyze APK security and automate auditing
    How to analyze APK security and automate auditing
    1. Small talk When it comes to mobile security, you may be unfamiliar with it, because research in this area has only gradually become popular in recent years. So what is mobile security? First of all, we know that mobile security is nothing more than some security issues on the iOS platform and Android platform, including some issues in the platform system itself and issues at the application level. Of course, some communication protocols need to be involved when the client and server interact, mainly http and https protocols, and of course some other protocols, such as websocket and so on. We won’t pay too much attention to the flaws of these protocols themselves. What we need to pay attention to is whether the data packets are encrypted when necessary during transmission, and whether the server has the right to operate the user.
    Safety 1060 2023-05-13 12:07:05
  • How to solve the ZipperDown vulnerability
    How to solve the ZipperDown vulnerability
    Attack conditions for the ZipperDown security vulnerability: 1. The App uses ZipArchive2, a zip package delivered by the App is not encrypted during transmission, and the zip package is not encrypted. 3. The App uses JSPatch or other execution engines, and the local script is not encrypted. The script can be executed as long as it is placed in the specified directory, and the legality of the local script is not verified. 4. Users connect to unreliable WIFI hotspots for network communication. Methods to circumvent this vulnerability; developers' own circumvention methods: 1. Repair the SSZipArchive library , in the unzipFileAtPath decompression function, intercept the "../" string that may cause directory traversal. 2. Communication between client and server
    Safety 1086 2023-05-13 11:55:21
  • How to understand vCenter Server and host management
    How to understand vCenter Server and host management
    vCenterServer and host management - vCenterServer connection When using vSphereClient to connect to vCenterServer, you can manage vCenterServer and all the hosts and virtual machines it manages. 1. Run VMwarevSphereClient locally and log in as an administrator; enter the IP address or vCenterServer name; enter the Windows administrator user name ; Enter the Windows administrator password 2. When connecting to vCenter Server for the first time after installation, there is no object in the list. 2. Host management creates a data center: equivalent to a container, hosts in the same data center can do
    Safety 910 2023-05-13 11:49:13
  • What are the javascript functions used by Baidu Maps?
    What are the javascript functions used by Baidu Maps?
    JS functions used in Baidu Map developed by javascript //Create and initialize map functions: functioninitMap(){createMap();//Create a map setMapEvent();//Set map events addMapControl();//Add controls to the map addMarker();//Add marker to the map}//Create map function: functioncreateMap(){varmap=newBMap.Map("container");//Create a map in the Baidu map container varpoint=newB
    Safety 1593 2023-05-13 11:40:06
  • What are the differences between mesh networking and wireless bridging?
    What are the differences between mesh networking and wireless bridging?
    1. Networking mode 1. Wireless bridging is point-to-point or point-to-multipoint networking communication, which is mainly based on directional transmission. 2. Mesh means that all devices have equal status in the wireless network, and any network node can access the wired network. 2. Distance 1. Wireless bridging is mainly based on fixed point monitoring, and different antenna selections are selected according to different scenarios. 2. The characteristic of mesh is that it is very flexible in deployment. The antennas used with Mesh ad hoc network equipment are mainly omnidirectional antennas, which can quickly establish the system. 3. Transmission rate 1. The design transmission rate of the bridge is mainly 300Mbps and 866Mbps. Specifications 2. The configuration of the antenna is mainly omnidirectional antenna, which has relatively large attenuation. Therefore, the speed is not obvious compared with traditional bridges. Four, pass
    Safety 7515 2023-05-13 11:37:05
  • Struts2-052 vulnerability example analysis
    Struts2-052 vulnerability example analysis
    Preface On September 5, 2017, a serious vulnerability discovered by security researchers from the foreign security research organization lgtm.com was officially released in Apache Struts2. The vulnerability number was CVE-2017-9805 (S2-052). An attacker can pass in a carefully constructed XML data, remote command execution. There is a deserialization vulnerability in the XStream component of the Struts2REST plug-in. When using the XStream component to deserialize data packets in XML format, the data content is not effectively verified, which poses a security risk and can be executed by remote commands. Exploit conditions: Using REST plugin and within the affected version range. Exploitation method: The attacker constructs malicious data packets for remote exploitation.
    Safety 1365 2023-05-13 11:25:06
  • How to encrypt Android apk released by unity
    How to encrypt Android apk released by unity
    Security Issues of the Unity3D Program Code Security Issues The core assembly file Assembly-CSharp.dll of the Unity3D program is a standard .NET file format and comes with rich metadata information such as method names, class names, type definitions, etc. You can use tools such as DnSpy to It can be easily decompiled and tampered with, and the code logic, class names, method names, etc. can be seen at a glance. Once the code logic is decompiled, it is easy to breed various types of plug-ins and destroy the balance of the game. If there are loopholes in the code logic, it is easy to be discovered and exploited, which may cause unpredictable losses to developers. Resource security issues: During the compilation and packaging phase, the Unity3D program will package resources into AssetBun through the Unity editor.
    Safety 1623 2023-05-13 11:10:22
  • How to use Nishang, the PowerShell penetration testing tool
    How to use Nishang, the PowerShell penetration testing tool
    Initial PowerShell, first let's understand the concept: PowerShell can be regarded as an upgraded version of cmd (bat scripting language), which is a scripting language on the Windows platform. It is object-oriented and closely related to .NetFrameWork. It can also be thought of as the bashshell on Windows. Windows PowerShell is a command line shell and scripting environment that enables command line users and script writers to take advantage of the power of the .NET Framework. It introduces a number of very useful new concepts, further extending what you get in the Windows Command Prompt and WindowsHost environments
    Safety 1250 2023-05-13 10:58:20
  • What is the way from XML to remote code execution
    What is the way from XML to remote code execution
    What is XXE? Simply put, XXE is XML external entity injection. When external entities are allowed to be referenced, by constructing malicious content, it may cause harm such as arbitrary file reading, system command execution, intranet port detection, and attacks on intranet websites. For example, if the program you are currently using is PHP, you can set libxml_disable_entity_loader to TRUE to disable external entities for defense purposes. Basic exploitation usually involves an attacker injecting payload into an XML file. Once the file is executed, local files on the server will be read, and access to the internal network will be initiated to scan internal network ports. In other words, XXE is a way to reach various services locally. also,
    Safety 1318 2023-05-13 10:04:21
  • How to conduct range practice with bee-box LDAP injection
    How to conduct range practice with bee-box LDAP injection
    If the essence of sql injection is to splice strings, then the essence of everything that can be injected is to splice strings. LDAP injection is no exception as a kind of injection. What is more interesting is that it is splicing parentheses (sql injection is also concatenates parentheses, but it is more conventional to say that it concatenates strings). In the environment configuration chapter, the configuration of the ldap environment in bee-box has been discussed in great detail. The shooting range practice chapter is more about the connection process between php and ldap, the introduction of the special functions used in the middle, and some techniques for splicing parentheses. Let’s first talk about the login process of the ldap shooting range in bwapp: First, this is an LDAP login interface, the URL is http://192.168.3.184/bW
    Safety 1692 2023-05-13 09:49:05
  • How to conduct analysis to bypass WTS-WAF
    How to conduct analysis to bypass WTS-WAF
    0x01. Looking for the target inurl:.php?id=intext: Electrical Appliances I found a website of an electrical appliances company. I tested it casually and found that there is a waf but it has not been arranged yet (I found some information and it seems that you can just add a sign instead of a space. Directly Try) 0x02. The operation found that there was no waf to intercept the data and it also said sqlmap.py-uhttp://*/*.php?id=29--tables--tamperspace2plus.py tool. I tried it and found that it could not be started. .....0x03.Hand-note http://*/*.php?id=1+and+1=1#The echo is normal http://*/*.php?id=1
    Safety 2059 2023-05-13 09:40:12

Tool Recommendations

jQuery enterprise message form contact code

jQuery enterprise message form contact code is a simple and practical enterprise message form and contact us introduction page code.
form button
2024-02-29

HTML5 MP3 music box playback effects

HTML5 MP3 music box playback special effect is an mp3 music player based on HTML5 css3 to create cute music box emoticons and click the switch button.

HTML5 cool particle animation navigation menu special effects

HTML5 cool particle animation navigation menu special effect is a special effect that changes color when the navigation menu is hovered by the mouse.
Menu navigation
2024-02-29

jQuery visual form drag and drop editing code

jQuery visual form drag and drop editing code is a visual form based on jQuery and bootstrap framework.
form button
2024-02-29

Organic fruit and vegetable supplier web template Bootstrap5

An organic fruit and vegetable supplier web template-Bootstrap5
Bootstrap template
2023-02-03

Bootstrap3 multifunctional data information background management responsive web page template-Novus

Bootstrap3 multifunctional data information background management responsive web page template-Novus
backend template
2023-02-02

Real estate resource service platform web page template Bootstrap5

Real estate resource service platform web page template Bootstrap5
Bootstrap template
2023-02-02

Simple resume information web template Bootstrap4

Simple resume information web template Bootstrap4
Bootstrap template
2023-02-02

Cute summer elements vector material (EPS PNG)

This is a cute summer element vector material, including the sun, sun hat, coconut tree, bikini, airplane, watermelon, ice cream, ice cream, cold drink, swimming ring, flip-flops, pineapple, conch, shell, starfish, crab, Lemons, sunscreen, sunglasses, etc., the materials are provided in EPS and PNG formats, including JPG previews.
PNG material
2024-05-09

Four red 2023 graduation badges vector material (AI EPS PNG)

This is a red 2023 graduation badge vector material, four in total, available in AI, EPS and PNG formats, including JPG preview.
PNG material
2024-02-29

Singing bird and cart filled with flowers design spring banner vector material (AI EPS)

This is a spring banner vector material designed with singing birds and a cart full of flowers. It is available in AI and EPS formats, including JPG preview.
banner picture
2024-02-29

Golden graduation cap vector material (EPS PNG)

This is a golden graduation cap vector material, available in EPS and PNG formats, including JPG preview.
PNG material
2024-02-27

Home Decor Cleaning and Repair Service Company Website Template

Home Decoration Cleaning and Maintenance Service Company Website Template is a website template download suitable for promotional websites that provide home decoration, cleaning, maintenance and other service organizations. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-05-09

Fresh color personal resume guide page template

Fresh color matching personal job application resume guide page template is a personal job search resume work display guide page web template download suitable for fresh color matching style. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-29

Designer Creative Job Resume Web Template

Designer Creative Job Resume Web Template is a downloadable web template for personal job resume display suitable for various designer positions. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28

Modern engineering construction company website template

The modern engineering and construction company website template is a downloadable website template suitable for promotion of the engineering and construction service industry. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28