current location:Home > Technical Articles > Operation and Maintenance > Safety
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- How to conduct in-depth analysis of the exploitation process of Apache HTTP component privilege escalation vulnerability
- Apache HTTP was found to have a local privilege escalation vulnerability (CVE-2019-0211). The author of the vulnerability immediately provided the WriteUp and vulnerability EXP. Alpha Labs also conducted an in-depth analysis of the EXP. Here, the analysis notes are organized and shared. I hope it will help everyone understand this vulnerability. The following content mainly explains step by step the execution steps of EXP, and also explains in detail several difficult-to-understand points in the utilization process. 1. Cause of the vulnerability The author's WriteUp has already introduced the code that caused the vulnerability. I will only briefly mention it here and omit most of the source code to reduce the reading burden. In Apache's MPMprefork mode, run the master server with root privileges
- Safety 1927 2023-05-13 09:28:05
-
- How to reverse engineer Spotify.app and hook its functions to obtain data
- The goal of this project is to build a Spotify client that can learn my listening habits and skip some songs that I would normally skip. I have to admit, this need comes from my laziness. I don't want to have to create or find playlists when I'm in the mood for something. What I want is to select a song in my library and be able to shuffle other songs and remove songs that don't "flow" from the queue. In order to achieve this, I need to learn some kind of model that can perform this task (maybe more on that in a future post). But in order to be able to train a model, I first need data to train it. Data I need a complete listening history, including those songs I skipped. Get history
- Safety 1077 2023-05-13 08:37:13
-
- How to implement Winnti Group new variant analysis
- In February 2020, WinntiGroup’s new modular backdoor PipeMon was discovered. Its main targets are Korean and Taiwanese multiplayer online gaming and video companies, and the malware can launch attacks on the supply chain. Attackers can embed Trojans in published games, or attack game servers, and use game currency to obtain financial benefits. WinntiGroup, which has been active since 2012, targets software industry supply chain attacks. Recently, ESET researchers also discovered attacks targeting several universities in Hong Kong. Technical analysis discovered two variants of PipeMon in targeted companies. The first stage of PipeMon consists of launching a password-protected executable embedded in .rsrc. Launch the program to RAR
- Safety 1189 2023-05-12 22:01:04
-
- How to conduct electronic wallet APP vulnerability analysis
- Razer Pay is widely used in Singapore and Malaysia. In this Writeup, the author used APP reverse analysis and Frida debugging to discover the user signature (Signature) generation vulnerability in the Razer Pay Ewallet. As a result, the chat history of Razer payment users can be read, the bank account bound to the user can be deleted, and the user's personal sensitive information can be stolen. The vulnerability eventually earned Razer an official reward of nearly $6,000. The following is the author's idea of vulnerability discovery, which can only be used as a reference for posture learning. Vulnerability background Razer Inc (RΛZΞR) is a gaming peripheral equipment company founded in Singapore, also known as the "Green Light Factory".
- Safety 1547 2023-05-12 21:55:10
-
- What is the principle of Layer 2 STP?
- The ultimate goal of STPSTP: From anywhere in the network, it is the shortest loop-free data forwarding path 1 to the same network as the switch: The first problem faced: Single point of failure Solution: Provide network redundancy/backup 1 Device backup 2 New problems brought by link backup: Layer 2 data forwarding loop New solution: STP/RSTP-spanning-treeprotpocol [Spanning Tree Protocol] highlights another problem: Utilization solution: MSTP [Generate Instance Tree Protocol] has standard protocols: STP-802.1d, slow; RSTP-802.1w, a little faster; MSTP-802.1s can also realize data forwarding while realizing link backup.
- Safety 1422 2023-05-12 21:43:11
-
- How to write high-quality and high-performance SQL query statements
- 1. First, we must understand what an execution plan is? The execution plan is a query plan made by the database based on the SQL statement and the statistical information of the related tables. This plan is automatically analyzed and generated by the query optimizer. For example, if a SQL statement is used to query 1 record from a table with 100,000 records, records, the query optimizer will choose the "index search" method. If the table is archived and there are currently only 5,000 records left, the query optimizer will change the plan and use the "full table scan" method. It can be seen that the execution plan is not fixed, it is "personalized". There are two important points in generating a correct "execution plan": (1) Does the SQL statement clearly tell the query optimizer what it wants to do? (2) The database system obtained by the query optimizer
- Safety 1417 2023-05-12 21:04:12
-
- What are the five common vulnerabilities of APIs?
- API makes it easy to do business, and hackers think so too. Today, when the digital transformation of enterprises is in full swing, APIs have gone far beyond the scope of technology. Both Internet business innovation and the digital transformation of traditional enterprises are inseparable from the API economy or API strategy. APIs connect not only systems and data, but also corporate functional departments, customers and partners, and even the entire business ecosystem. At the same time, with increasingly severe security threats, APIs are becoming the next frontier of network security. We have compiled the top five API security weaknesses and patching suggestions that security experts have given to enterprises. APIs make everything easier, from data sharing to system connectivity to the delivery of critical functionality, but APIs also make it easier for attackers, including malicious bots
- Safety 1276 2023-05-12 20:40:04
-
- How to configure the environment for bee-box LDAP injection
- 1. Overview According to my learning process, I must know what the model and vulnerability of my web attack are. Now I have encountered an unexpected situation. The first time I saw LDAP was during a penetration test in a state-owned enterprise. I found an unpopular one (authorized) and piqued my interest in it. The concept of LDAP: Full name: Lightweight Directory Access Protocol (Lightweight Directory Access Protocol), features: I won’t talk about the protocol, it’s too esoteric, it can be understood as a database for storing data, its special feature is that it is a tree A database in the form of a database. First, the name of the database is equivalent to the root of the tree (i.e. DB=dc), and then the process from the root to a leaf node is
- Safety 949 2023-05-12 20:37:04
-
- How to reproduce the Apache Struts2--048 remote code execution vulnerability
- 0x00 Introduction The Struts2 framework is an open source web application architecture for developing JavaEE web applications. It utilizes and extends JavaServletAPI and encourages developers to adopt MVC architecture. Struts2 takes the excellent design ideas of WebWork as the core, absorbs some advantages of the Struts framework, and provides a neater Web application framework implemented in the MVC design pattern. Overview of the 0x01 vulnerability. The ApacheStruts22.3.x series has the struts2-struts1-plugin plug-in enabled and the struts2-showcase directory exists. The cause of the vulnerability is when ActionMe
- Safety 1654 2023-05-12 19:43:10
-
- What does ip address conflict mean?
- The meaning of IP address conflict is that in the same LAN, if two users use the same IP address at the same time, or one user has obtained an IP address through DHCP, and at this time, other users assign it manually. If the same IP address is specified, this will cause an IP address conflict and prevent one of the users from using the network normally. Causes and solutions to IP address conflicts: If two users on the same LAN use the same IP address at the same time, or one user has obtained an IP address through DHCP, and at this time other users assign it manually. If the same IP address is specified, this will cause an IP address conflict and prevent one of the users from using the network normally. So
- Safety 2856 2023-05-12 19:40:04
-
- What is the batch injection plug-in generated by Burpsuit combined with SQLMapAPI?
- 1.1 Changes: Added filtering settings, optimized display results, added running prompt information, added domain name regular matching. The entire plug-in is divided into three panels: task panel, sqlmapapi parameter configuration panel, and filter conditions panel. Task panel Server: the IP and port of the SQLmapapi service THREAD: the number of tasks detected simultaneously Domain: the domain name to be detected, supports regular matching CLEAN: clears the task cache list TEST: tests whether the SQLmapapi connection is successful START: turns on detection The lower left is the task list and Task status, below the button on the right is the information prompt area, and below it are the request details and scan results. The settings here in the sqlmapapi parameter configuration panel refer to sql
- Safety 1340 2023-05-12 19:19:04
-
- How to implement vulnerability analysis caused by use after release of C++ program
- 1. Use after release When dynamically allocated memory is released, the contents of the memory are undefined and may remain intact and accessible, because when the released memory block is reallocated or recycled is determined by the memory manager, but , or the contents of this memory may have been changed, causing unexpected program behavior. Therefore, when the memory is released, it is guaranteed that it will no longer be written to or read from. 2. Harm of use after release Problems caused by improper memory management are common vulnerabilities in C/C++ programs. Use after free can lead to potential exploitable risks, including abnormal program termination, arbitrary code execution, and denial of service attacks. From January to November 2018, there were a total of 134 vulnerability information related to it in CVE. Some of the vulnerabilities are as follows: CVE vulnerabilities
- Safety 1569 2023-05-12 17:37:06
-
- How to conduct in-depth analysis of the drupal8 framework and dynamic debugging of vulnerabilities
- Foreword In the drupal framework, the most classic and closest to us is the CVE-2018-7600 vulnerability in 2018. However, in the process of reading and studying this vulnerability analysis article, I found that they are all detailed analysis of this vulnerability point. People who are not very familiar with the running process of this framework may have difficulty understanding it after reading it. The following is mainly divided into two parts: The first part is an introduction to the drupal framework process (here mainly for the 8.x series), letting us know how the drupal framework based on the symfony open source framework uses the listener mode to support the entire complex Process flow and give us a basic understanding of how the framework handles a request. The second part, combined with the framework to detect vulnerabilities
- Safety 1335 2023-05-12 17:19:06
-
- How to analyze Nazar components in depth
- 6:22AM11/7/2012confickersstillontarget6:18AM11/7/2012checkinglogs-weareclean8:16PM7/2/2012-BOOM!,gotthecallback These are the records left by Equation Group (NSA) in attacking the target system, which were later leaked by ShadowBrokers. Recently, security researchers revealed a previously misidentified and unknown threat group called Nazar. The Nazar components will be analyzed in depth below. Background The Shadow Brokers leaked data brought numerous vulnerabilities, such as EternalBlue, into the spotlight, but
- Safety 770 2023-05-12 16:46:06
-
- How to analyze gunicorn Arbiter source code
- As mentioned earlier, Arbiter is the core of the gunicornmaster process. Arbiter is mainly responsible for managing worker processes, including starting, monitoring, and killing worker processes. At the same time, Arbiter can also hot update (reload) App applications or upgrade gunicorn online when certain signals occur. The core code of Arbiter is in one file, and the amount of code is not large. The source code is here: https://github.com/benoitc/gunicorn. Arbiter mainly has the following methods: setup: handles configuration items, the most important ones are the number of workers and the worker working model i
- Safety 1467 2023-05-12 16:28:18