Android Security Special-AndBug dynamic debugging tool environment setup
Environment Construction
Git clone cd to the AndBug directory and execute make
58deMacBook-Pro-7:AndBug wuxian$ makePYTHONPATH=lib python setup.py testrunning test.:: '' of () -> '':: '1' of (0,) -> '\x00':: '2' of (1,) -> '\x00\x01':: '4' of (1,) -> '\x00\x00\x00\x01':: '8' of (1,) -> '\x00\x00\x00\x00\x00\x00\x00\x01':: 'f' of (1,
Paip. Website scan security tool HP webinspect User Guide
Author attilax, 1466519819@qq.com
I downloaded webinspect 9.02 (251 m) and needed to activate it .. Cracked the v8.x file.
Ding, is usable...
Install the patch after webinspect 9.02 is installed.ProgramFirst pathc, then "lisence", select
The XML lisence file is activated ..
Use webinspect 9.02 to start web scanning. The scan fails. Data
Librar
1, Nikto2Introduction: Nikto2 is a multi-platform scanning software written in Perl and isa command-line mode tool that scans the Web type of a specified hosthost name, specific directory, Cookie, specific CGI vulnerability, XSS vulnerability, SQLinject vulnerabilities, return security issues such as HTTP methods allowed by the host. Location:/pentest/web/niktousage 1:./nikto.pl-h host IP or domain name-o s
Introduction to the use and setting of the network security tool software BlackICE)BlackICE won the PC Magazine technical excellence award in year 99. Experts commented on it: "For home users without firewalls, BlackICE is an indispensable line of defense; for enterprise networks, an additional protection measure is provided. Instead of replacing the firewall, it blocks intruders attempting to pass through
to the lower half of the dialog box.Modify Network Request ContentSometimes in order to debug the server interface, we need to repeatedly try different parameters of the network request. Charles makes it easy to provide modification and re-sending of network requests. Simply right-click on a previous network request and select "Edit" to create an editable network request. As shown below:We can modify any information about the request, including the URL address, port, parameters, etc., and then
PHP Web Trojan Scanner
PHP Web Trojan scanner-Security Testing Tool, a tool that scans php Trojans in a php environment. The following features can be scanned currently. Lazy design: Apply the phpspy style directly. Note: The scanned file is not necessarily a backdoor. Please judge, review, and compare the original file by yourself.
Composer. php
The Code is
PHPWeb Trojan scanner-security testing tool, a tool that scans php Trojans in a php environment. the following features can be scanned. Lazy design: apply the phpspy style directly. Note: the scanned file is not necessarily a backdoor. please judge, review, and compare the original file ghost. php.
The code is as follows:
/************* PHP Web Trojan scanne
PHP.ini Safety Configuration Detection Tool PCC Brief Introduction, PHP.INIPCC
Overview
Some time ago, in the work encountered an open-source program, the program is mainly used to detect the PHP configuration files in the presence of security risks, and put forward appropriate configuration recommendations, so that the PHP program more secure.
Use
This program is very simple to use, you can use it on
, Awvs installation method and install Windows program installation method, we mainly explain the installation of the main point:2, install to the last step when the "Launch Acunetix Web vulnerbility Scanner" Before the tick removed, the installation will be completed on the desktop to generate two icons:3, after we will crack patch moved to Awvs's installation directory, open crack patch. Click Patch to complete the hack, and finally close the crack patch.4, after the crack, the program will po
Several gadgets extracted from rising Enterprise Edition are:
1. The filedsty file is crushed and cannot be recovered after deletion.
2 scanbd vulnerability scan, which can automatically download patches from Microsoft
3. regclean, which can fix malicious modifications to the Registry
Rising file shredder 2007Supports drag and drop of files/folders and small file splitters of risingProgramTo clear the files. In addition, this program can be run independently. It supports drag and drop of f
PHP. ini Security Configuration detection tool pcc brief introduction, php. inipcc
Overview
Some time ago, I encountered an open-source program in my work. This program is mainly used to check the security risks of configuration items in the PHP configuration file, and puts forward corresponding configuration suggestions, makes PHP programs safer.
Use
This pr
and PC is connected to the same LAN, Samsung as an exampleEnter your phone's settings, click enter Wi-Fi settings, select the wireless network you are connected to, and press and hold the pop-up options Box:4 is shown below:Select Modify Network configuration:See Figure 5Select Show advanced Options, set the proxy to manual, fill in the IP address and port number obtained above, and click Save. This will make our phone set up successfully.Fourth step: Download the Fiddler
. Privilegecount = 1; Lookupprivilegevalue (NULL, Se_debug_name, TP. Privileges[0]. LUID); Tp. Privileges[0]. Attributes = se_privilege_enabled; AdjustTokenPrivileges (Htoken, FALSE, TP, sizeof (TP), NULL, NULL); CloseHandle (Htoken); }}write code to the source program of the new form, and fill in the form initialization function, so that the form is generated with permissions, and finally declared in the header file can
#漏洞预警 # Popular Network tool wget was found to have a security vulnerability (cve-2014-4877).
When wget is used to recursively download an FTP site, an attacker can trigger the vulnerability by constructing a malicious symbolic link file that creates arbitrary files, directories, or symbolic links and sets access permissions on the wget user's system. Please pay attention to the use of their own version of
described here:
Vi. program testing After the above program is compiled successfully, run and test:
Figure 2 run the program
When the program starts, all Win32 service applications on the local machine are listed. You can click the single-choice button to switch to the display of the driver. Here you can also use the Professional Software Sreng for comparison:
Figure 3 Use Sreng to display services
The two are the same, indicating that our program is no problem.
VII. Su
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.