Network Fingerprint Recognition

1. Preface In penetration testing, our primary task is to collect information. Therefore, network fingerprint recognition is an indispensable environment. Next we will introduce several common network identification methods. 2.1 Netcat If we want to

Get user privacy data through DragJacking

The drag-and-drop feature is currently supported by mainstream browsers, but it is still different in terms of function support and security. For detailed technical details, refer to MOZILLA'sDrag & DropChapter. In HTML5, drag and drop is a part of

Multiple brute-force password cracking apps: myth? Joke!

Crack Wi-Fi password Software The best neighbor in the world is the one who has WiFi but never set a password. This sentence aroused the resonance of countless netizens. Finding a free Wi-Fi network is indeed a dream of many diaosi men going home

Automatic intrusion defense

Intrusion detection is a technology that uses the traces left by intruders, such as logon Failure records to effectively discover illegal intrusions from external or internal sources. It takes detection and control as the technical essence and plays

About several free online Trojan Detection websites

Sometimes we need to know the security of a website. You can mount Jinshan and rising's cloud Security Detection System at the bottom of the website, as shown in:If you need to know the scanning effect, check the two URLs:Kingsoft RisingBut I don't

Exponent CMS 0.96.3 SQL Injection Vulnerability

Google: inurl: articlemodule Exploit: http: // server/index. php? Action = view_article & module = articlemodule & id = SQL INJECTION SQL INJECTION:-1 + union + select + 1, 2, 3, password, username, 6 + from + exponent_user --Column:

Interactivefx. ie cms SQL Injection Vulnerability

========================================================== ========== Interactivefx. ie cms SQL Injection Vulnerability ========================================================== ========== 1-=- =-= 0 0 _ 1 1/_ '/\__/_ '0 0/\ _, ___/\ _ ___, _/_ __

KenWard & amp; #39; s Zipper v1.400 Buffer Overflow-Meth

#! /Usr/bin/python # KenWards Zipper v1.400 File Name Buffer Overflow # Coded by sinn3r (x90.sinner {at} gmail {d0t} com) # Tested on: Windows XP SP3 ENG # Reference: http://www.exploit-db.com/exploits/11834 # Big thanks to mr_me, and corelanc0d3r.

Direct News 4.10.2 Multiple Remote File Include & amp; nb

Test method: The Program (method) provided on this site may be offensive and only used for security research and teaching. You are at your own risk! \ | ///\--//(@@)---- OOOo -- (_)-oOOo --------------------------------------------------Direct News 4

How to increase the Elevation of Privilege

I. First, check whether the website server has opened the 3389 remote terminal. Ii. Check whether serv-u is used for the Service (what version is available) Method I. Copy a website and connect it with the 3389 login device (whether it is successful)

Linux Kernel ReiserFS File System bypass security restriction Vulnerability

Affected Versions:Linux kernel 2.6.x vulnerability description: Linux Kernel is the Kernel used by open source Linux. Linux Kernel's ReiserFS file system does not properly restrict access to the. reiserfs_priv directory. Local Users can gain root

Shopv8 mall system v10.48 0-Day Vulnerability

Author: Lan3aAffected Versions: Shopv8 mall system v10.48Vulnerability Description: SQL Injection exists on the pinglun. asp page.Author: Lan3a All the programs on the front-end are equipped with anti-injection code, so I will not go over it. Go

Babao micro-blog direct database explosion

Wowoconn. asp If Session ("_ WTypeID") = "" then' current site type Session ("_ WTypeID") = 1 Session. Timeout = 900 End if 'On error resume next Set conn = Server. CreateObject ("adodb. connection ") Conn. Open "provider = microsoft. jet. oledb.4.0;

Fckeditor 2.63 0-Day Vulnerability

First, let's talk about it. This is fckeditor 2.63 oday. Currently, many people know about it. Http://xxxx.com/fckeditor/editor/filemanager/connectors/test.html Http://hbkingco.com//fckeditor/editor/filemanager/connectors/uploadtest.html, the two

Summary of application of several iis vbs scripts in penetration

1. query all websites in IIS C: WINDOWSsystem32> cscript.exe iisweb. vbs/queryMicrosoft (R) Windows Script Host Version 5.6Copyright (C) Microsoft Corporation 1996-2001. All rights reserved. Connecting to server... Completed.Site Name (Metabase Path)

ECShop 2.7.2 latest arbitrary User Login vulnerability 0day

Due to the needs of recent projects, I checked the source code of ECShop 2.7.2, which was recently released by the business school. I did not expect to find an obvious and low-level vulnerability when I saw the second file. This vulnerability allows

PHP universal password login

To be honest, if a website's front-end is prone to injection vulnerabilities, the chances of having a universal password in the background are basically A hundred percent. However, some people say that if the GPC magic conversion is enabled for the

C9 static article publishing system vulnerability 0day

The program named C9 static article publishing system was not carefully read. Today, I downloaded a copy and read it again. I found the problem. In voting, it was a flash voting system. I didn't understand flash, So I caught a package. I found it

BBSMAX Forum program logging on to any user and getting user password information Vulnerability

BBSMAX is the earliest development basis in China. the bbs built by the net technology is dedicated to leobbs and Microsoft. when net was just born, BBSMAX began to develop (called nowboard at that time). After years of development, from personal

Cookie injection and Online Shopping System Vulnerabilities in liangjing information website system

From dark visitor :Http://www.liangjing.org/zh/HTML/Product_158.htmlThe program does not prevent Cookie injection, so we can use it!Here I use the code of the lonely hedgehog.JmdcwName = request ("zhushe ")JmdcwName = escape (JmdcwName)JmStr = "city

Total Pages: 1330 1 .... 1276 1277 1278 1279 1280 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.