Preliminary Research on Anti-cracking Design Technology of VB shared software (2)

Author: Aegean Sea [SCG] 2008/09/06 (reprinted please keep this information) In the previous article, I roughly explained the following: 1. File integrity to prevent unauthorized modification2. Check during running to prevent LOADER3. Anti-debugging

Common On-market encryption disc cracking incomplete Tactics

There are many encrypted discs on the market today, which are burned in special forms. After you put it into the optical drive, a software installation screen will show you to enter the serial number, if the serial number is correct, a file browsing

Incomplete Analysis of a strong shell in. net

Incomplete Analysis of a strong shell in. netIn fact, the question is somewhat different from the content, because this article does not conduct in-depth analysis on the shell itself, but analyzes its protection and cracking from another perspective.

Best way to prevent software cracking through distorted transformation Encryption

1. Generally, encryption is shelling. We often consider how to encrypt an executable file to ensure security? Generally, shells are used. The working principle of the shelling tool is to encrypt and convert the code and data of executable files and

Explanation of IIS write permission exploitation and write permission vulnerability

I wrote an article three and a half years ago:Try IIS write permission and move to aspAt that time, there was still a problem. This article was used to solve the problems left over from that year. Many people may think that iis put is not worth

Methods To cope with infinite file recovery in webshell

In this case, a file in webshell (webshell only) cannot be deleted and cannot be modified. The attribute can be deleted after attributes is removed, but the file is instantly "full of blood, in the original place" It seems that this situation has

Technical explanation of blind Injection

 Technical explanation of blind Injection Judge version number(Select % 20 count (*), concat (select % 20 @ version % 20), 0x3a, floor (rand () * 2 )) % 20x % 20 from % 20 (select % 201% 20 union % 20 select % 202) % 20a % 20 group % 20by % 20x % 20

WordPress custom page Plugin Remote Inclusion Vulnerability and repair

A plug-in on a custom page of Worepress has the remote Inclusion Vulnerability. Plug-in name: wp custom pages version: 0.5.0.1 Please upgrade the new version as soon as you have installed it. Send a test. As follows: Windows % 2fwin. ini "> http:/

Analysis on the CMS system Injection Vulnerability

Before introducing this vulnerability, it is necessary to clarify the concept of wide byte injection. Wide-byte injection is relative to single-byte injection. Single-byte injection is usually used to recover SQL statements after URLs with parameter

Time and Expense Management System multiple security vulnerabilities and repair

Time and Expense Management System is an ERP System developed using PHP. The Time and Expense Management System has the command injection, file upload, and reflected cross-site scripting vulnerabilities, attackers may intrude the website that has

Jcow 4.2.1 Local File Inclusion Vulnerability and repair

Jcow is a PHP-based social network and online community script. Jcow 4.2.1 has a local file inclusion vulnerability, which may cause sensitive information leakage. [+] Info:~~~~~~~~~Jcow 4.2.1 LFI VulnerabilitySoftware ...... Jcow

Discussion on the Method of Detecting and clearing the black link of a website

Sometimes it is very rare to Do SEO, because the website is full of black chains, and SEO xiaomiao has been worried about website hacking for a long time in the past few days, we do know that the black chain industry is becoming more and more

PHP blind injection common statements such as database brute-force statements

Judge version number (Select % 20 count (*), concat (select % 20 @ version % 20), 0x3a, floor (rand () * 2 )) % 20x % 20 from % 20 (select % 201% 20 union % 20 select % 202) % 20a % 20 group % 20by % 20x % 20 limit % 201) % 23 ">

WPtouch WordPress Plugin 1.9.27 URL redirection

Hello, thats a 0day on the must downloaded WordPress plugin. # Exploit Title: 0-Day WPtouch WordPress Plugin 1.9.27 URL redirection # Google Dork: intext: "Powered by Wordpress + WPtouch" (with iphone/android User-Agent) # Author: MaKyOtOx

Changtu mobile phone password retrieval vulnerability and ddos email server problems and fixes

After testing, there was a vulnerability in two locations and there was another design problem. Unverified users could not retrieve their passwords by email. If they were not verified, they could also place orders, that is, a lot of business

Buffer overflow from the difference between get and post

When submitting a webpage form (form), you can select two submission methods: get and post. Most of us know that post should be used when submitting form data, and that the get method is not safe. What makes the difference between get and post? This

How did I bypass Sina Weibo's defense and continue to attract fans?

1. this hole is not the title party; 2. first refer to the vulnerability http://www.bkjia.com/Article/201302/191898.html to share a major Internet manufacturers to prevent CSRF common problems; 3. in fact, before that, I mentioned with Jin long that

How to break into an unknown software that hurts more than a dongle

I found the background by hand, tried various weak passwords, and continued to see the title siteserver cms. Then I went to Baidu to find the latest website system, it seems that I have never been dug for a vulnerability. I am not familiar with

It's all about universal passwords + out-of-the-stars

I haven't written an article for a long time .. Today, when I published my website, I got out of the stars.-So let's see the following. Hahaha, I checked the IP address on the website.Recently, I prefer Hong Kong and the United States.The fck is not

Network administrators must see the whole process of penetrating a large information port network.

Every day on the internet, I always see a website hacked. I admire the techniques of those infiltration experts, and admire them as if they were in the water of the river. This afternoon I was chatting with sophia. He asked me to stand up. I agreed

Total Pages: 1330 1 .... 288 289 290 291 292 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.