Enhance router IOS security-disable unnecessary services

Cisco Discovery ProtocolCDP: Cisco Discovery Protocol (CDP: Cisco Discovery Protocol), which is basically used to obtain the Protocol addresses of directly connected devices and platforms for discovering these devices. Supports ATM, Ethernet, FDDI,

Oracle brute-force Injection

0 × 00 targetTarget: http://www.xxx.cc/view.asp? Kind = NN4 & bbsno = 450 × 01 determine the Database TypeOracle supports-type annotations, but does not. Multiple statements are separated and executed. oracle has many system tables, such as

Quickly detects the POC of malicious RTF Files

Describe the content in plain text and save information in various formats. You can create the content in a text version or Word. Rich Text Format is a cross-platform document Format developed by Microsoft. Most text processing software can read and

Wireless Hacking: D. O.S and AP Spoofing

In today's society, wireless networks are becoming more and more developed. However, no matter whether it is enterprise or self-use wifi hotspots, it does not pay much attention to its security, in addition, some malicious personnel and commercial

Enhanced Email transmission security

We know that emails are transmitted over the network in plain text by default. That is to say, as long as someone can intercept your network data packets, there will be no confidentiality for your emails. So how can we enhance mail Transmission

How to bind a MAC address to the WIFI tutorial

In addition to setting the password and hiding the SSID, we can also bind our mac address. mac is the only physical address of our network card. A network card has only a unique mac address and will never repeat the steps. We know that using the

Penetration Testing tips

1.The system prompts that the specified handle is invalid.Almost none of Baidu's searches can solve this problem.The correct solution method is to get the opposite machine name in address authentication \ 1.1.1.1, such as ADMINPC. Then, CMDEcho 1.1.1

HTTPS protocol analysis and packet interception extension (2)

Author: the author and the website of the shadow team must be posted at www.anying.org.The previous article (http://www.bkjia.com/Article/201303/195669.html) talked about using ettercap for sniffing, so this time we will abandon ettercap, for a new

Expanded results using DNS resolution principles

Leng fengge+ ------------------------------- +I. QuestionDuring Penetration Testing, when we get webshell, we may encounter the following problems:(1) When you get the WebShell and easily get the server System, but when you find that this server has

How to Ensure DNS security from the operational perspective

As we all know, DNS, as a basic Internet service, plays a vital role in the normal operation of the entire internet. Of course, the attacker with ulterior motives understands this truth and always wants to use various attack methods to disrupt the

Sablog-X 2.0 background management permission Spoofing Vulnerability

// Cp. phpif (! $ Sax_uid |! $ Sax_pw |! $ Sax_logincount |! $ Sax_hash) {// as long as this condition is not met, you can verify loginpage ();}... if ($ sax_group = 1) {// to obtain administrator permissions, you must also ensure that the $

Discuz! 7.2 manyou plug-in brute-force Path & amp; Get Webshell 0day

In the latest discuz! 7.2 comes with a new application plug-in manyou. In this new plug-in, the passed parameters are not checked. When GPC is off, the injection vulnerability is generated. Vulnerability Analysis:File./manyou/sources/notice.

How to test XSS vulnerabilities

Black box manual testing• Page testing with input boxes For non-Rich Text, enter special characters in the input box submit On the submitted page, check the source code. Find the source code before and after tiehua in the source code based on the

Faweb_2 Mullti Vulnerability

========================================================== ========================================================== ========== | # Title: Faweb_2 Mullti Vulnerability | # Author: indoushka | # Web Site: | # Tested on: windows SP2 franzais V. (Pnx2

PHP Classifieds V6.09 E-mail Dump Vulnerability

========================================================== ========================================================== ========== | # Title: PHP Classifieds V6.09 E-mail Dump Vulnerability | # Author: indoushka | # Tested on: Lunix français v. (9.4

Do all in cmd shell!

Directory1. Preface2. File Transfer3. System Configuration4. Network Configuration5. Software Installation6. Windows scripts7. Postscript PrefaceCmd Shell (command line interaction) is an eternal topic for hackers. It has a long history and has a

Hacker tips for publishing books

Xiaoz blog NO1 PHP injection is case sensitive A fish always drops a site, so the table name and column name cannot be retrieved!    I tried it manually. This station is very strange. If there is a mistake, a box will pop up. Because it is the KR

Decrypts two ASP webshells, including WebShell 6.0 VIP and Manage Login.

From kingknife blog Today, a friend of the new group in Dao ke city threw out a shell. I thought it was an asp file, so I had an instinct to see if there was a backdoor. The first is WebShell 6.0 VIP (password cracking protection ),Decryption This

Shopex V4.8.4 V4.8.5 0-day kill + official test

Chapter Author: dbggerThe premise is that the database server applied by the program can be connected externally. This is critical. When I got my website, I met the website and couldn't find the vulnerability on the Internet. I took the source code

Upgrade webshell 0day in the background of the latest DVBBS8.0 or later versions

Chars blog If the server supports PHP, you can add php to the file format set in the forum settings. View the upload address in the background file management office. This background Elevation of Privilege Vulnerability was accidentally discovered

Total Pages: 1330 1 .... 1006 1007 1008 1009 1010 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.