Token story (CVE-2015-0002)0x00 Preface
I like vulnerability research very much and sometimes find a significant difference between the difficulty of vulnerability mining and the difficulty of exploits. The Project Zero Blog contains many complex
How to bypass the remote lock function of IOS8
The remote lock function of IOS helps users remotely lock their lost Apple devices, so that thieves or the person who finds the device cannot access the content of the device.
However, a security
Export SqlServer credensqlserver to facilitate your intranet penetration
As mentioned in the netspi blog, you can export the creden。 added later in sqlserver after logging on to the DAC. According to msdn, these creden。 are generally windows user
Reuse Denial of Service Vulnerability (CVE-2015-0361) after Xen release)
Release date:Updated on:
Affected Systems:XenSource Xen 4.4.xXenSource Xen 4.3.xXenSource Xen 4.2.xDescription:Bugtraq id: 71882CVE (CAN) ID: CVE-2015-0361
Xen is an
Network Security: Analysis of ARP cache infection attacks (lower)
Man-in-the-middle attack
Hackers use ARP cache poisoning to intercept network information between two devices in your LAN. For example, we assume that hackers want to intercept
Use the Mod_Security and Mod_evasive modules to protect Apache (1)
For people in the host hosting industry, or if you host your own server and expose the server to the Internet, protecting the system from attackers is a top priority.
Mod_security
Anti-virus attack and defense: A Preliminary Study of malicious program hiding-DLL hidingI. Preface I used three articles to describe how to use DLL to hide processes (For details, refer to Article 009th on anti-virus attack and defense: DLL
Create a permanent backdoor using NTFS data streams
NTFS exchange data stream (ADS) is a feature of the NTFS disk format. In the NTFS file system, each file can have multiple data streams, in other words, in addition to the main file stream, many
Attackers can exploit the ElasticSearch vulnerability to obtain webshell permissions of a website.
ElasticSearch is usually deployed in many large enterprises. Therefore, further penetration makes sense after obtaining an intranet permission. In the
Getshell can be used if the jboss of Debon logistics is improperly configured.
Http: // 180.153.24.6: 8180/invoker/JMXInvokerServletHttp: // 180.153.24.6: 8180/invoker/EJBInvokerHAServletBoth servlets can be deployed with
Discuz! Getshell
Some forums may be stored in other directories without the utility direct convert.
If you see that the data/directory of the conversion program cannot be written, you don't have to try
Expose how hackers control and attack your website by uploading a jsp page
Some time ago, the company asked a security company in the industry to perform a security scan on the enterprise's information system and found many security risks and system
XSS vulnerability search and detection
1. Black box testing
Black box testing refers to testing the system without knowing the code and running status of the system. In the detection of XSS vulnerabilities, we can simulate hacker attack methods and
The process of successfully penetrating an authorized website
Cause
One of our customers wants us to perform penetration tests on their websites to discover their weaknesses and help improve security. After obtaining the penetration test
Baidu cloud CDN protection rules Bypass
Baidu cloud accelerates waf rule Bypass
1: When dedecms features were created, the domain names were collected,Www.52jscn.com. This website is of the dedecms type. However, during the payload test, we found
Huawei network disk storage type xss
RT. Thk @/fd.Detailed description:
Buy glory 6. Test it ..Upload a file. Release External links. Modify external link nameThe entity encoding can generate an output point.
Code Region
Two exploitation
Dom xss mining and Analysis of a business master station in QQ
Attackers can steal the skey and uin from all browsers without blocking them.
When mining flashxss, we accidentally discovered such a URL during decompilation:
Show.qq.com is a main
Jiayuan Talent System Latest Version injection (ignoring defense)
See \ member \ person_interview.php
If ($ do = 'del ') {$ checks = $ _ POST ['check']; $ db-> query ("delete from {$ cfg ['tb _ pre']} myinterview where I _pmember = '$ username' and
A SQL blind injection vulnerability exists in the main site of Tongcheng Network (with verification script)
SQL blind injection on the same main site
Http://www.ly.com/youlun/CruiseTours/CruiseToursAjax.aspx? The lineid parameter of Type =
[Security] (1): Hacker programming skillsI have been in contact with the security field for four years. I have been familiar with many aspects, but I am not proficient. I feel that my strength is lacking, therefore, I decided to start learning the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.