/**************************************************************************** * I.MX6 U-Boot MKCONFI G Hacking * Disclaimer: * This article is primarily to know how mkconfig works in U-boot, how to summarize the contents of the configuration *, and where to put the content. * 2015-12-19 Zengjianfeng *******************************************************, Ping Shan Village, Nanshan District, Shenzhen ********************/ \\\\\\\\\-
Hacking Team monitoring code analysis
Hacking Team leaked a lot of monitoring code. For example, Soldier, a spyware program on Windows, is used to illegally listen to users' online information and local information. Let's analyze this project today.
Engineering Introduction
The project structure is as follows:
It contains two parts: Updater (upgrade) and Soldier. Let's take a look at Soldier.
The director
/******************************************************************** * i.mx6 Mfgtool2-android-mx6q-sabresd-emmc.vbs Hacking * Description: * Previously used mfgtool2 is the direct implementation of MfgTool2.exe on the line, now NXP will its seal * in the VBS file, which is Zodong told me , this records the nature of the command-line arguments. * 2016-9-18 Shenzhen Nanshan Ping Shan village Zengjianfeng ************************************************
# am335x Android EMMC mkmmc-android.sh hacking##1. Read the Android partition file in a moment. # 2. Code Source: https://github.com/hendersa/bbbandroid-external-ti_android_utilities/blob/master/am335x/mk-mmc/mkmmc-android.sh ## .-9-8Shenzhen Nanshan Ping Shan Village Zengjianfeng #!/bin/bash# If there is only one parameter, this will exit directly Expected_args=1if[ $# ==$EXPECTED _args]then Echo"assuming Def
/*********************************************************************** * Linux Socketcan Client Server Demo Hacking * Description: * This article is mainly to understand Linux on the basic use of Socketcan, content and Linux on the * network programming almost. * 2016-3-28 Shenzhen Nanshan Ping Shan village Zengjianfeng ********************************************************** ************/one, cat client.c #include#includeif.h>#include#ifndef Pf_c
/**************************************************************************** * OK335xS PWM buzzer Linux Driver Hacking * Statement: * This article is only to know how to use PWM to control the buzzer, has reached the control of different sound frequency. * 2015-10-7 rain shenzhen Nanshan Ping Shan village Zengjianfeng ************************************************************ ***************/#include#include#include#include#include#include#include#
The first computer hacking event in China (1998)
June 16, 1998, a Shanghai Information network staff in the routine inspection, hair
The network is being attacked by uninvited guests. July 13, the criminal suspect Yang MoU was arrested.
This is the first case of computer
hacking in China.
After investigation, this
hacker has invaded the network 8 servers, deciphered the network big
Accounts and pa
With the advancement of education informationization, various kinds of educational websites have sprung up. Because most of the education Web site is the school computer teacher's own development and management of small sites, the general existence of equipment, technology, professional problems, the site itself has loopholes, often become the target of hacker attacks, seriously affecting the normal business development. Here, the author hopes that through the analysis of the three
#Coding:utf-8##Python MySQL ORM quickorm hacking#Description:#previously only knew that there was an ORM, but the internal workings of the ORM thing were not very clear,#this time we need to use it, so I read a relatively simple example of Python2 orm. ##Reference Source:#A Simple ORM provides elegant API for python-mysql operation#Https://github.com/2shou/QuickORM##2016-10-15 Shenzhen Nanshan Ping Shan village ZengjianfengImportMySQLdb##as a domain c
Prevent hackers from hacking into the Windows system you are using
When hackers invade a host, will find ways to protect their "labor results", so will leave a variety of back door on the broiler to a long time to control the broiler, which is the most used is the account hiding technology. Create a hidden account on the broiler for use when needed. Account hiding technology is the most hidden back door, the general user is difficult to find hidden a
attract visitors,
However, I and the partner two people to now also think about how benign development, at least to make the server costs, unfortunately is free at the same time, we did not develop the way to add value.
The above is a simple process introduction:
Say some of my thoughts and sighs during this period:
1. Hackers ' stations are vulnerable to attack. Of course, all I've come across is nothing to destroy. All of these became friends later. I feel that the wicked are still few.
John the Ripper method to generate the password:The test user is Crackme password is pass, only a few seconds can be cracked.(approximately 20 seconds to test 100,000 passwords)The test script is as follows:Use Net::mysql;$|=1;My $mysql = Net::mysql->new (hostname = ' 192.168.2.3′,Database = ' Test ',user = "User",Password = "Secret",debug = 0,);$crackuser = "Crackme";while (Chomp$currentpass = $_;$VV = join "",$crackuser,"\x14″.Net::mysql::P assword->scramble ($currentpass, $mysql->{salt}, $my
The annual Pwn2Own hacking competition is a nightmare for various browsers, especially the Internet Explorer. Chrome was not so lucky this year until the end of previous years, and the competition was won at the beginning.The Vupen team used a security vulnerability to break Chrome within five minutes of the start of the game. They will receive a reward of at least $6000, some of which are Google's pockets.
Of course, the security vulnerability that
Gsm bts Hacking: Use BladeRF and open source BTS 5 to build base stations
CitationIf you have purchased Nuand (official) BladeRF x40, you can run OpenBTS on it and enter instructions to complete some tasks. In general, HackRF is the most widely covered SDR board. Almost all of its information is open-source, and even contains KiCad files. The disadvantage is that it does not have an FPGA and uses a low-speed USB2 interface. The accuracy of ADC/DAC is
Android Hacking Part 6: Debugging Android applications
In the future, we will learn how to use JDB to debug Android applications. If an Android Application can be debugged, we can inject and run our own code in the Process of the application.
Background
This article is not even more interesting. I developed a simple demo application with only one button and one input box.
Download:
Http://yunpan.cn/cf3RVN5fRRC73 (extract code: 8734)
Run the following
About your battle: simple and beautiful hacking gamesThis is a simple and beautiful little game mounted on Github. It seems nothing special, challenges test your exploration of various programming languages or at a higher level (today I am not low-I am proficient in C, C ++, JAVA, PHP, Python, Ruby, javascript, VB, Go, Perl, and other languages !)X001: G () ('al') DescriptionThe G () ('al') game is to challenge you and enable you to use as many langua
Web Hacking skills
Introduction
This is the second article in web penetration exercises. You can search for the translation of the first article on our website and find it in this part, we will briefly introduce directory traversal and the Tips about crawler crawling key information on webpages.
Exercise 8 Directory Traversal
Figure: a simple web page for viewing article content
In this exercise, we need to open the PathTraversal directory, in the di
in mid-2011, the Linux kernel official website kernel.org was hacked, the attacker implanted a rootkit Phalanx and set up the SSH backdoor on the server, kernel.org for three weeks. The official said it would open a report on the invasion, but the promise was not fulfilled until now: The U.S. Department of Justice issued a press release announcing that Florida police arrested 27-year-old programmer Donald Ryan Austin on August 28 and was released after paying $50,000 in bail.If convicted, he fac
steps to build down the server ( ASP , PHP , JSP ). 2 , Master for example Google hackers, Cookies , phishing, social engineering, etc.3 , Learning HTML , JavaScript , VBScript . 4 , Learning Standards SQL language, and the use of most databases. 5 , Learning ASP , and has an excavation ASP the ability to script vulnerabilities. 6 , Learning PHP , and has an excavation PHP the ability to script vulnerabilities. 7 , Learning JSP , and has an excavation JSP the ability to script vulnerabilities.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.