On the project encountered a system will suddenly down the problem, because there is no detailed log information, baffled, and finally one day the problem appears again, the captured log information is:Error:transport error 202:handshake failed-connection prematurally closed ["transport.c", L41]JDWP exit Error Jvmti_error_none (0): Could not connect, timeout or fatal errorA search on the internet, the truth is that it was jkd1.5 a bug about how debug runs, because the JVM crashes because it rece
Often heard of ASP upload vulnerability, that is, some Trojan file to modify the suffix name (modified to the image file suffix), upload.
Use the following functions for this situation to identify:
Copy Code code as follows:
'******************************************************************
' Checkfiletype function to check whether a file is a picture file
' parameter filename is the path to the local file
' If it's one of the file jpe
Recently, some sites were found to be vulnerable to UBB Cross-site scripting attacks. Cross-site scripting attacks are rarely a significant impact on the server, but for a site, this vulnerability is too unworthy! Small, play point what dongdong come out, then change the homepage; Heavy theft of the user's cookies, even more will be g off the viewer's hard drive. A site is turned into a malicious website, who dares to come? If the station's webmaster
, then the harm is very great
Google can also be used to search for a number of vulnerable programs, such as Zeroboard before the discovery of a file code leak vulnerability, you can use Google to find online use of this program station
Point:
Intext:zeroboard filetype:php
or use:
Inurlutlogin.php?_zb_path= site:.jp
To find the page we need. phpMyAdmin is a powerful database * for software, some sites due to configuration errors, we can not use t
security details, develop good safety habits, otherwise it will bring huge security risks to their website. At present, most of the ASP programs on the site have such a security vulnerability, but if you write a program to pay attention to, it can be avoided.
1, user name and password is cracked
Attack principle: User name and password, is often the most interesting thing to hackers, if the source code is seen in some way, the consequences are seri
Safety
How to better achieve the prevention of hacker attacks, I mention personal views! First, the free program does not really have a fee, since you can share the original code, then the attacker can analyze the code. If you pay attention to precautions in detail, your site's security will be greatly improved. Even if there are vulnerabilities such as SQL injection, attackers will not be able to take your site immediately. Due to the ease of use of ASP, more and more Web site background progra
Resolves 18, MS ODBC database connection overflow causes nt/9x denial of service attack
Vulnerability Description:
A Microsoft ODBC database may have potential overflow problems when connecting and disconnecting (Microsoft Access database related).
Connecting directly to the second database without canceling the connection may cause the service to stop.
Impact System:
ODBC version: 3.510.3711.0
ODBC Access Driver version: 3.51.1029.00
OS version: Wi
Resolution iis4.0/iis5.0 very long file name request there is a vulnerability
Vulnerability Description:
Affected version:
Microsoft IIS 5.0
+ Microsoft Windows NT 2000
Microsoft IIS 4.0
+ Microsoft Windows NT 4.0
+ Microsoft BackOffice 4.5
-Microsoft Windows NT 4.0
+ Microsoft BackOffice 4.0
-Microsoft Windows NT 4.0
When a known filename is added with 230 "%20" plus a. htr, Microsoft IIS 4.0/5.0 is in
Vulnerability Name: ms12-020 Remote Desktop Protocol RDP denial of Access vulnerability
Condition: The victim must open the RDP protocol open port 3389 or port changed, know the opposite of RDP open port.
1.nmap Scan for a host with 3389 ports open in a network segment
NMAP-VV--open-p 3389-PN 60.10.0.0/16
2. Use the ms12-020 script in nmap to batch scan for the presence of vulnerabilities
Cd/usr/
The patching scenario appears.http://struts.apache.org/development/2.x/docs/security-bulletins.html-(announcement)The official security bulletin gives a number and a brief introduction, "A vulnerability, present in the Includeparams attribute of the URL and Anchor Tag, allows remote command Execution ".But it doesn't say the principle, nor does it release any patches.Analysis:In fact, this time STRUTS2 official issued a total of two loopholes, there i
"Sadie Network" Microsoft urgently released early last week to disclose the SMB (Server message Module) V2 security vulnerabilities to circumvent measures to mitigate the Vista or Windows Server 2008 products such as users of the risk of hacking attacks.
The patch, which Microsoft added to the security bulletin, is designed to provide users with a temporary defense against remote code execution using this known security vulnerability by turning off t
people. In the free speech area, you can share your experiences and ideas with your audience, each speaker has 30 minutes to freely allocate. After 30 minutes, if you have some questions to discuss with your audience, you can discuss them in the free discussion area.In the free speech Area 1 We will provide a projector where you can use PPT. In the free speech Area 2 We will provide a whiteboard for you to demonstrate.The free discussion area is a venue for free discussion by all participants.A
/_temp_view?limit=10', Data='{"Language": "cmd", "Map": ""}')Else: Session.put (Target+'/wooyun/_design/test', Data='{"_id": "_design/test", "views": {"Wooyun": {"map": "}}," Language ":" CMD "}')0X04 SolutionsIn the Couchdb\etc\couchdb\default.iniPort =5984couchdb Port number bind_address=0.0.0.0The IP address of the COUCHDB, if set to 127 here.0.0.1, then the extranet cannot be accessed. Max_connections=2048couchdb Maximum number of connections Database_dir= .. /var/lib/couchdb Data file direc
Project Address: SqliscannerBrief introduction
Corporation a passive SQL injection vulnerability scanning Tool based on Sqlmap and Charles
A module isolated from the internal security platform supporting the scanning of Har files (with Charles use: Tools=>auto Save)Characteristics
Mailbox Notifications
Task statistics
Sqlmap reproducing command generation
Depend on
Python 3.x
Django 1.9
PostgreSQL
Vulnerability Description:Memcache is a common set of Key-value cache system, because it does not have a rights control module, so the Open Network Memcache service is easy to be scanned by attackers, through command interaction can be directly read memcache sensitive information.Fix solution:Because Memcache has no rights control function, users are required to restrict access to the source. scenario One: Memcached-d-M 1024-u root-l 127.0.0.1-p 1121
The vulnerability was fixed in the older version, but the new version still has a vulnerabilityImpact Scope: Linux Kernel version 4.14-4.4,ubuntu/debian releaseExp:http://cyseclabs.com/exploits/upstream44.cTest environment[Email protected]:~$ uname-alinux ubuntu 4.4.0-87-generic #110-ubuntu SMP Tue Jul 12:55:35 UTC x86_64 x86_64 x86_ Gnu/linuxStart testing[Email protected]:~$ gcc-o Test upstream44.c [email protected]:~$ chmod-r 777 Test[email protecte
Android Privilege Elevation Vulnerability CVE-2014-7920 CVE-2014-7921 Analysis
This is Android mediaserver Elevation of Privilege Vulnerability, the use of CVE-2014-7920 and CVE-2014-7921 to achieve Elevation of Privilege, from 0 permission mentioned media permissions, where the CVE-2014-7921 affects Android 4.0.3 and later versions, CVE-2014-7920 affects Android 2.2 and later versions. Google did not fix
Introduction to Android Privilege Elevation Vulnerability CVE-2014-7920 and CVE-2014-7921
This is Android mediaserver Elevation of Privilege Vulnerability, the use of CVE-2014-7920 and CVE-2014-7921 to achieve Elevation of Privilege, from 0 permission mentioned media permissions, where the CVE-2014-7921 affects Android 4.0.3 and later versions, CVE-2014-7920 affects Android 2.2 and later versions. Google di
Recently, information related to Microsoft's lnk Vulnerability (Shortcut Vulnerability) has been disclosed, because the use of this vulnerability to spread malware has a significant feature of "getting at a glance, immediately attract high attention from security vendors. Li tiejun, Kingsoft drug overlord antivirus expert, was invited to give a wide range of neti
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.