Recently, a friend forgot his password after using "Mobile encryption", a free online software, and I used ollydbg to solve the problem of forgetting the password after folder encryption. Although there are some solutions on the internet, however,
Source: http://zhengj3.blog.51cto.com/6106/290724This repair task is designed to handle the following security issues:[1] SQL blind Injection[2] SQL Injection[3] XPath Injection[4] database error modes discovered[5] Cross-Site Scripting[6]
An ASP program that brute-force cracking MSSQL user password. The following versions can be used to close the browser after running. After running, a result file will be generated in the current directory.
CODE:
'============ ASP Port export by
Reposted from: Hilven
Directory
1. Penetration Process of this target.
Process 1.1
An episode in the middle of 1.2.
1.3 penetration completed.
Ii. system problems found during testing and Solutions
2.1 Access Control.
2.2 security management and
RAyh4c Black BoxI haven't updated my blog for a long time. I flipped through a piece of code to test the gmail mhtml vulnerability in WIN7. I don't know where to lose the full version I wrote --!
The MHTML vulnerability initiates an AJAX request in
The last time I saw ring3 H, I took WEBSHELL through this program, but he was very simple and had a function:
It is easy to replace directly. Not much. I will focus on how to use SHELL in a version without this function. It seems that many
Overview
ActionScript is a language based on ECMAScript. When processing interaction requirements, Flash applications use this language. Like other languages,There are some implementation modes that may cause security problems in ActionScript. In
Author: Don Tukulesto (root@indonesiancoder.com )Homepage: http://indonesiancoder.comPublished: July 17,201 1Tested On: OS X 10.5.8====================================== ======================================| Software Info | www.2cto.com===========
To access a remote database using Windows authentication from an ASP. NET application, use the following methods:
• Use the default ASP. NET process account. By creating an image account with the same user name and password on the database server,
Author: H3art Data: Jan 20, 2013 first introduces url redirection. URL redirection (URL redirection, or URL redirection or Domain Name redirection) refers to the technology that directs a user to another URL when browsing a URL. It is often used to
It may be because there are too many tests for testing dolls. A friend asked me to check the security of his website a few days ago. Wow, it's a safe dog and a 360 website guard. How can this be done. The first step is to find a place where you can
In an xss problem encountered in this encoding problem, utf-7 and mutf-7 this encoding is used by mail, javamail should be supported, using utf-7 this is still relatively rare encoding can be used for some xss applications. Using Native jdk reports
Question:
A long time ago, I used CMS to build a site and collected some content, so I didn't take care of it and became a garbage station that nobody maintained. Yesterday, I occasionally found that my website was hacked once without knowing when
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.