Use network traffic analysis to improve network security visibility

Over the years, security experts have been arguing about whether external personnel or internal personnel bring greater risks. Today, this debate has no practical significance: As network boundaries are blurred, threats are everywhere.For example,

A Tom's Arp attack and defense practices

Frankly speaking, I am a little white, that is, the target group of major hackers and security vendors. The former is attacking me, and the latter may protect me. But in any case, the latter should be powerless-I have encountered a legendary Arp

Using SMS to hijack a Facebook account

This article demonstrates a simple vulnerability. This vulnerability allows you to gain full control of any Facebook account without any user interaction. See the following. Facebook allows you to associate your mobile phone number with your account.

Modify the NIC address and defend against ARP attacks in Mac OS X.

I have been using the Mac system for some time. Here I will record the problems that need to be solved by terminal commands. The network environment is bound to the MAC address of the original machine. for special reasons, change the NIC address of

Use of windows Firewall logs in IP tracking

Speaking of windows logs, we are most familiar with system logs. There are also many ready-made tools on the Internet to clear windows system events. however, you may not pay much attention to windows system firewall logs. no tool dedicated to

Test the security of an innovative route

0x00 digress I am honored to be able to participate in the public test of wooyun. I have been watching the dark cloud Zone as a bystander. I also thank the Friends of Insight Labs & wooyun for giving me this opportunity to participate in the test.

Good and evil-when I find my iPad stolen

On a Sunday evening, I noticed that I hadn't seen my iPad for several days. It's not surprising that this happened because my apartment was a mess. At on Monday night, I began to have doubts about this (well, most of them think my husband has been

Phplist version 2.8.11 SQL Injection Vulnerability

Test method:The Program (method) provided on this site may be offensive and only used for security research and teaching. You are at your own risk![~] Bytes ---------------------------------------------------------------------------------------------

Sogou search engine has security risks

Miao Diyu The security of this search engine cannot be ignored now! In fact, after Baidu is hacked, other search engines and portals should be taken as a

Fenxun (FooSun) favorite. asp page unauthorized Vulnerability (2) and repair

Affected Versions: FooSun> 5.0Vulnerability description: In the file User favorite. in asp: Elseif Request ("Action") = "sort" Then // 21st rows if Request ("id") = "" Or Request ("classID ") = "" thenstrShowErr = " the parameter is invalid!

PHP168 Arbitrary File Download Vulnerability Analysis

I flipped through the old file today and found an analysis report a long time ago. Then I went to the php168 test site to test whether the vulnerability still exists?Vulnerability-related file HASHB912249a22b630c04f7ad65f8ba5a2f6 download.

Apache Security Settings

 By default, Many Apache installation displays the version number and operating system version, and even the Apache module installed on the server. This information can be used by hackers, and they can also learn that many of the settings on the

Douban Dom persistent cross-site scripting vulnerability and repair solution

A csrf cross-site submission and XSS cross-site scripting vulnerability exists in a Douban service. Some csrf vulnerabilities exist at Douban, most of which are caused by undetected ck values.If you create a page to submit the parameter name = &

XSS vulnerability and repair on a Sina Channel

The search characters are not effectively filtered, causing XSS vulnerability. & Service = cars> http://che.sina.com.cn/apps/index.php? Homo = off & mod = auto & act = sinaresult & type = search & query = "> & service = cars Copy to the browser

Youuku injection vulnerability and repair solution: you can log on to the background to perform video review and change the number of votes.

Brief description:Obtain the background password through SQL injection. After logon, you can perform video review and change the number of votes (suspected of cheating ~~).Yes (not supported by wooyun currently) Detailed

Insecure website configuration and repair solutions for sogou Input Method

Http://pinyin.sogou.com/test.phpPhp configuration information for websites with phpinfoEnable_dl ON enabled (default dl is enabled to load external extension)Display_errors Off (recommended)PHP Version 5.1.6 recommended updateAbsolute website

Methods and security measures for hackers to leave webshell backdoors in iis

Many people are discussing how to protect themselves.WebShell permissions are not found.Share something I use.Download the DLL dynamic library and install it in iis6. [change the file name, file storage location, and extension as you like. How to

Phpaa cms 0-day and repair

Author: BlAck. Eagle Cookie Spoofing Vulnerability file:/admin/global. php /** * Public configuration file in the background * * Used for background application initialization and background permission Verification */ Require_once

Use of Netease Weibo CSRF

No token verification is performed, which is vulnerable to CSRF attacks. Detailed description:A malicious attacker can construct a malicious form and obtain the victim's click. When the victim clicks the link, a microblog message is generated in the

Xp_hello.dll (sa) Elevation of Privilege

Source: Freezing Point Forum February Main Code: Create a stored procedure project in VC6 and write the following code In proc. cpp: # Include # Include # Define XP_NOERROR 0 # Define XP_ERROR 1 # Define MAXCOLNAME 25 # Define MAXNAME 25 # Define

Total Pages: 1330 1 .... 1014 1015 1016 1017 1018 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.