Implement DNS poisoning attacks on iOS platforms

I just saw an original dns poisoning attack on ios on skey. It's good. mark it; First, we recommend a software source for Cydia: ininjas.com/repo.You can find some basic network security tools, such as dsniff, set, msf, nmap...You can check the

Handle Linux host records infiltrated by ssh-scan

In the morning, I found that a Linux AS 4 host was hacked by Hacker and had a lot of scanssh processes. Intruders usually use password dictionary files such as passwd.txt of common Linux/unixapplication services such as oracle, sybase, nagios,

Enterprise Intranet Information Protection: preventing leakage of personnel and mobile devices

Intranet confidentiality is a major event for enterprises. network administrators can reach a consensus with the enterprise's top management and adopt appropriate measures to keep the network confidential for leaks of personnel and mobile

D-LinkDSP-W215 smart socket Remote Command Execution

0x00 background   The D-Link DSP-W215 smart outlet is a socket that uses a wireless control power switch. You cannot buy firmware from Amazon or best practices, but you can download the firmware from the D-Link website ). DSP-W215 has a stack

Wi-Fi cracking + Intranet sniffing

Solve the WiFi problem of the girl next door and get the qq Weibo e-mail thought: first crack the Wi-Fi password, then the Intranet sniffing and man-in-the-middle attacks, get the sister's password or forge session sessions, log on to your account

Shell sharing of ftp backup server data integrity check and SMS warning

This script checks the data integrity of remote backup to the ftp server and whether ftp is sent to the server, if the ftp server is not backed up in time, the script will trigger the SMS alarm function module to generate an SMS alarm. Finally, due

Install PortSentry1.2 in Centos5.5 to prevent malicious Scanning

When I checked the security environment of a Centos5.5 server, I found that many IP addresses were maliciously scanning the port on this server. I originally wanted to deploy the snort anti-intrusion environment. Later I found that the snort

ARP binding on the ASA firewall

Currently, my company uses all static IP addresses. There is an ASA5505 firewall in the company, in this firewall, some users must be restricted from using certain applications, such as QQ farms. To implement these functions, we need to bind ARP to

Repeat encrypted Authentication

Speaking of identity Authentication, we will think of AAA. AAA stands for Authentication, Authorization, and Accounting, which means Authentication, Authorization, and Accounting. Its main purpose is to manage which users can access the server, what

OpenStack installation and monitoring configuration video tutorial

OpenStack is a cloud computing software jointly developed by NASA and Rackspace. It is a free software and open source code project used to build public and private clouds. Its software usage is complex, this video will show you how to install and

Use SHELL scripts to defend against SSH and vsftpd brute force cracking (version ②)

When I routinely checked/var/log/secure logs on the FTP backup server, I found a lot of authentication information for sshd and vsftpd failures. It is obvious that someone wants to use brute force cracking tools to steal passwords, therefore, you

Write a trojan program in Linux C to steal the root user password

In Linux, there are many methods to escalate privileges from common users to root. Most of these methods exploit system kernel vulnerabilities to escalate privileges, of course, you can use Trojans like windows to steal the Administrator's root

Emergency response skills after computer virus infection

Many of my friends, if they find their computers poisoned, will only be panic and complain in the computer. In fact, we should take some urgent measures calmly at this time. Next, let's work with the editor to learn some emergency

Working principle of Firewall

Www.bkjia.com: an old article written before January 1, year 45"Will hackers give me their ideas ?" That's right. hackers just want to crack the fly with eggs and see the light from system vulnerabilities! Okay. How can we protect your network?

Xss bypass waf note

Instance 1, WAF Filter: ”onmouseover”ByPass: %d  Instance 2, WAF detects alert, because many automatic detection tools use this statement to test XSS “ onmouseover=alert(‘XSS within input field’)orWAF keyword Filter:alert (some test tools use

Suggestions on preventing SQL injection vulnerability attacks on PHP code websites

All website administrators are concerned about website security issues. Speaking of security, you have to talk about SQL Injection attacks ). Hackers can gain access to the website database through SQL injection attacks, and then they can obtain all

[Security Science] The nature of sessions you must understand

One thing we must admit is that most web applications are inseparable from the use of sessions. This article will analyze how to establish a secure session management mechanism based on php and http protocol. First, let's briefly understand some

Use bitwise inversion in PHP (~) Function creation Backdoor

1) PHP ~ Bitwise operators PHP: bitwise operator-http://www.php.net/manual/zh/language.operators.bitwise.php Some time ago, a foreigner posted an interesting things on twitter. after a string of suspected garbled characters was accessed, it could

Unveil the secrets of SAML

Today, more and more systems are linked to each other through Web Services, portals, and integrated applications. The demand for standards for secure information exchange to be shared is also growing. SAML (Security Assertion Markup Language)

Analysis of A reflected XSS example

When we access a webpage, we add parameters after the URL. The server constructs different HTML responses based on the request parameter values. For example, http: // localhost: 8080/prjWebSec/xss/reflectedXSS. jsp? Param = value... in the preceding

Total Pages: 1330 1 .... 303 304 305 306 307 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.