Analysis of malicious samples on Controlled Terminals of a botnet
0x00 intro
Recently, the "360-eye threat awareness system", which is deployed on the 360 cloud platform (https://cloud.360.cn), found that the system warns of abnormal traffic on a
Https provides Secure web communication
1. principles: 1) Understanding encryption algorithms: Classification of encryption algorithms: symmetric encryption and asymmetric encryption. symmetric encryption: encryption and decryption use the same key.
Multiple SQL injection vulnerabilities in a substation of Huawei
Multiple SQL injection vulnerabilities in a substation of Huawei
Http://consumer.huawei.com/support/services/service/tcsReservation/findReservationByReservationNo? Jsonp = jquery19102
Lobotomy: Android Reverse Engineering Framework (Part2)
0 × 01 Overview
InPart 1, We explained how to load the applicationLobotomyAnd how the Lobotomy global loader works. In the second part (this article), we will introduce how to use Lobotomy to
McAfee Application Control swin. sys Kernel Driver Denial of Service Vulnerability (CVE-2016-1715)
Affected Systems:
McAfee Application Control 6.2.0McAfee Application Control 6.1.3McAfee Application Control 6.1.2McAfee Application Control
2345 security guard Driver Exploitation Vulnerability
2345 a driver of Security Guard has the arbitrary address Write vulnerability that can be Elevation of Privilege.
2345 the IRP_MJ_DEVICE_CONTROL distribution routine of a security guard driver
A system design defect in Suzhou tietong (four systems, nine regions, hundreds of OLT devices exposed \ tens of thousands of users are expected to be affected)
This wonderful defect!
**.**.**.**:9000
Contains four systems:
Suzhou tietong telephone
MEDCIN Engine Vulnerability exploitation details
Popular Science: The MEDCIN engine is an electronic medical record system for doctors and nurses.A few months ago, I found a vulnerability in the earlier version of the MEDCIN engine's security
Wireshark DCOM parser Denial of Service Vulnerability (CVE-2015-8714)
Affected Systems:Wireshark 1.12.0-1.12.8Unaffected system:Wireshark 1.12.9Description:CVE (CAN) ID: CVE-2015-8714Wireshark is the most popular network protocol parser.Wireshark 1.
Mining and defense of SQL Injection Vulnerabilities in DVWA Series 6
Next we will look at the high-level SQL Injection source code.In addition to the previous mysql_real_escape_string () function, a stripslashes () function is added to it. This
DVWA Series 8 medium-level Command Execution Vulnerability
Set DVWA Security to medium, and click "View Source" in Command Execution to View the webpage Source code.Here, the variable $ target used to receive the IP address entered by the user is
The SQL injection vulnerability exists in the official Apsara stack APP (67 databases and verification scripts are supported)
Ask SQLMAP to bypass the if-filtered tamper ~
Target: Official api.fengniao.com)The SQL injection vulnerability exists in
Social engineering database applications implemented using Whoosh
When organizing the computer, I found a social engineering library written in Python. I used Whoosh to create an index for the social engineering library file based on the line
A vulnerability in digital shenzhou.com may cause millions of sensitive information leaks, including the mobile phone number of the user's specific address name.
Ask for the homepage, and ask for 20 rank!
219.143.21346: 7002Weblogic applicationJAVA
A system vulnerability in Guohua life may cause leakage of tens of millions of user data.
The database is threatened. Calculate 20 rank.
Http: // 59.151.39.90/indexlis. jsp
POST http://59.151.39.90/common/easyQueryVer3/EasyQueryXML.jsp
Exploring phishing emails: How do hackers forge emails?
Disclaimer: This site provides security tools and procedures (methods) that may be offensive and only for security research and teaching. You are at your own risk!
Nowadays, phishing emails are
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.