Cainiao: the most secure encryption and decryption

Author: Zhongguancun online Zhang Qi1st page: high skill in Cracking Encryption and decryption are a permanent hot topic. What kind of encryption is secure? How can we unlock common passwords? Have you realized that there are too many insecure

Flash-Restore Say Bye

Author: NetKi1l [ESST] China cracking alliance [edevil-Soul Security Team] (http://www.cncracker.com)Tools used in this article:OD Ring3 dynamic debugging tool (32-bit) Wait) after the assumer.exe process is completed, you can create a new one! When

IAT encryption manual search (iawen)

Old articles in the past are available today. Let's move them together!For the sample, see the attachment! The PEid shell display is: Microsoft Visual C ++ 6.0However, after loading with OD, a prompt is displayed: After confirmation, the OD stops: 01

Use Ildasm, ILasm, Peverify to Crack applications written by others

Http://www.cnblogs.com/montaque/archive/2005/01/10/89464.html I drew more than half an hour yesterday to crack the. NET program SQLDBCompare. It was only a 15-day trial period and it will not be found after the cracking, hoho. Now I am writing a

Simple deauthentication of Armadillo 3.78-4. xx dual-Process

Text/graph espressoIn the last issue, we talked about the simple removal of single and dual-process Armadillo protective shells, the elastic (referred to as the pangolin protective shell) encryption shell, and the exclusive ESP law shelling method,

Questions about EXECryptor parameter settings

Software that recently shells one character processing. I found some problems in the use of EXECryptor. On Some xp sp3 machines, anti-debug cannot run if checked, but it can run on my notebook. Xp sp3 in my notebook can run, but it cannot run in

Full Process Analysis of UPX3.03 shell section processing

The analysis is not very good. Some things have not been clearly expressed. Everyone analyzed them by themselves. This program is a process management program I wrote myself, but it has not been written yet ....UPX3.03 shelling, encryption

Use winrar security encryption

It is easy to use winrar for encryption, but it is still insecure if the method is not proper. For example, if the number of characters in a password is too small and the characters are too frequently used, it is especially dangerous to use only

MetInfo global variable overwrite alternative breakthrough anti-Injection

PrefaceFor mature cms, SQL inject, and xss, all have their own defense code. However, some logic errors and misunderstandings may make system defense as a false one, this article is a case that uses global variables to cover multiple security

FAQs about the SMS Platform

In the recent penetration test project, some problems have occurred in the functions of the SMS platform, and several issues related to the SMS platform on wooyun.I. No frequency limit for sending text messagesSearch on wooyun shows that this type

Dig gold network unlimited brush coins

The website has a logic error and can be used to brush up without limit. Details: I accidentally found this site and tested it. The result shows that there is a logic error, and you can brush gold without limit. The vulnerability occurs in the place

GPL guanglida professional competition website SQL blind note, you can get shell privilege escalation, ticket farming skills, etc.

GPL guanglida professional competition (http://www.gplcn.com/) Although it is a small competition, the number of people concerned about the small. but someone asked me to check his security. let's talk about the Registry ticket first: the

Pseudo Static injection to foreign sites

I have been learning about databases recently, and I have been studying some advanced injection syntaxes in PHP, which is quite interesting. So I found a website with holes on the Internet to practice hand injection. So we have the following. First,

Jiayuan talent website content management system file traversal vulnerability and repair

You can traverse the server in the background, delete it at will, and export the trojan through MYSQL in the obtained path. The image management page in the background can traverse the entire server. Through code, we can see isset ($ dir) or $ dir =

Cookie Injection Attack and Defense in the Web Attack and Defense Series

With the development of network security technology, SQL injection is increasingly known as a popular attack method. Many websites also protect against SQL injection. Many website administrators add anti-injection programs. At this time, when we use

HTML5 security defense 7: new tag attacks

HTML5 removes many outdated labels, such as and , and introduces many interesting new labels, for example, the and tags allow dynamic loading of audio and video. New tags introduced by HTML5 include , , , , and . These tags have some interesting

Use PreparedStatement to prevent SQL Injection

An inefficient SQL statement is enough to destroy the entire application. statement is the parent interface of PreparedStatement. It does not perform pre-compilation, reducing the overhead of pre-compilation. A single run of PreparedStatement is

Ecshop XSS cross-site scripting vulnerability directly in the background

Versions affected by the vulnerability have not been confirmed yet! In some versions, after you insert it into the file, a file will confirm the value you inserted. In that version, X is not a bird! Almost all other versions are supported! It exists

Arbitrary File Upload caused by improper processing of a CMS Logic

The process of uploading a CMS file is improper, so that you can control the file name and upload any file.First, check the upload page: upload images image path: ">">">"> Pass it to upload_ OK .asp for processing. Check upload_ OK .asp source

Youyan net SQL injection vulnerability + weak administrator password

Help a friend to detect the website, Shun found the friends of the vulnerability: from friends to get the code, install, and then visit the blog, NETWORK, you can see a such NETWORK request http://api.uyan.cc /? Url = xxxx & title = xxx & du = & pic

Total Pages: 1330 1 .... 591 592 593 594 595 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.