1. Preface
In penetration testing, our primary task is to collect information. Therefore, network fingerprint recognition is an indispensable environment. Next we will introduce several common network identification methods.
2.1 Netcat
If we want to
The drag-and-drop feature is currently supported by mainstream browsers, but it is still different in terms of function support and security. For detailed technical details, refer to MOZILLA'sDrag & DropChapter. In HTML5, drag and drop is a part of
Crack Wi-Fi password Software
The best neighbor in the world is the one who has WiFi but never set a password. This sentence aroused the resonance of countless netizens. Finding a free Wi-Fi network is indeed a dream of many diaosi men going home
Intrusion detection is a technology that uses the traces left by intruders, such as logon Failure records to effectively discover illegal intrusions from external or internal sources. It takes detection and control as the technical essence and plays
Sometimes we need to know the security of a website. You can mount Jinshan and rising's cloud Security Detection System at the bottom of the website, as shown in:If you need to know the scanning effect, check the two URLs:Kingsoft RisingBut I don't
#! /Usr/bin/python
# KenWards Zipper v1.400 File Name Buffer Overflow
# Coded by sinn3r (x90.sinner {at} gmail {d0t} com)
# Tested on: Windows XP SP3 ENG
# Reference: http://www.exploit-db.com/exploits/11834
# Big thanks to mr_me, and corelanc0d3r.
Test method:
The Program (method) provided on this site may be offensive and only used for security research and teaching. You are at your own risk! \ | ///\--//(@@)---- OOOo -- (_)-oOOo --------------------------------------------------Direct News 4
I. First, check whether the website server has opened the 3389 remote terminal.
Ii. Check whether serv-u is used for the Service (what version is available)
Method
I. Copy a website and connect it with the 3389 login device (whether it is successful)
Affected Versions:Linux kernel 2.6.x vulnerability description:
Linux Kernel is the Kernel used by open source Linux.
Linux Kernel's ReiserFS file system does not properly restrict access to the. reiserfs_priv directory. Local Users can gain root
Author: Lan3aAffected Versions: Shopv8 mall system v10.48Vulnerability Description: SQL Injection exists on the pinglun. asp page.Author: Lan3a
All the programs on the front-end are equipped with anti-injection code, so I will not go over it.
Go
Wowoconn. asp
If Session ("_ WTypeID") = "" then' current site type
Session ("_ WTypeID") = 1
Session. Timeout = 900
End if
'On error resume next
Set conn = Server. CreateObject ("adodb. connection ")
Conn. Open "provider = microsoft. jet. oledb.4.0;
First, let's talk about it. This is fckeditor 2.63 oday. Currently, many people know about it.
Http://xxxx.com/fckeditor/editor/filemanager/connectors/test.html
Http://hbkingco.com//fckeditor/editor/filemanager/connectors/uploadtest.html, the two
1. query all websites in IIS
C: WINDOWSsystem32> cscript.exe iisweb. vbs/queryMicrosoft (R) Windows Script Host Version 5.6Copyright (C) Microsoft Corporation 1996-2001. All rights reserved.
Connecting to server... Completed.Site Name (Metabase Path)
Due to the needs of recent projects, I checked the source code of ECShop 2.7.2, which was recently released by the business school. I did not expect to find an obvious and low-level vulnerability when I saw the second file. This vulnerability allows
To be honest, if a website's front-end is prone to injection vulnerabilities, the chances of having a universal password in the background are basically
A hundred percent.
However, some people say that if the GPC magic conversion is enabled for the
The program named C9 static article publishing system was not carefully read. Today, I downloaded a copy and read it again. I found the problem. In voting, it was a flash voting system. I didn't understand flash, So I caught a package. I found it
BBSMAX is the earliest development basis in China. the bbs built by the net technology is dedicated to leobbs and Microsoft. when net was just born, BBSMAX began to develop (called nowboard at that time). After years of development, from personal
From dark visitor
:Http://www.liangjing.org/zh/HTML/Product_158.htmlThe program does not prevent Cookie injection, so we can use it!Here I use the code of the lonely hedgehog.JmdcwName = request ("zhushe ")JmdcwName = escape (JmdcwName)JmStr = "city
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.