Author: Zhongguancun online Zhang Qi1st page: high skill in Cracking
Encryption and decryption are a permanent hot topic. What kind of encryption is secure? How can we unlock common passwords? Have you realized that there are too many insecure
Author: NetKi1l [ESST] China cracking alliance [edevil-Soul Security Team] (http://www.cncracker.com)Tools used in this article:OD Ring3 dynamic debugging tool (32-bit)
Wait) after the assumer.exe process is completed, you can create a new one! When
Old articles in the past are available today. Let's move them together!For the sample, see the attachment!
The PEid shell display is: Microsoft Visual C ++ 6.0However, after loading with OD, a prompt is displayed:
After confirmation, the OD stops:
01
Http://www.cnblogs.com/montaque/archive/2005/01/10/89464.html
I drew more than half an hour yesterday to crack the. NET program SQLDBCompare. It was only a 15-day trial period and it will not be found after the cracking, hoho.
Now I am writing a
Text/graph espressoIn the last issue, we talked about the simple removal of single and dual-process Armadillo protective shells, the elastic (referred to as the pangolin protective shell) encryption shell, and the exclusive ESP law shelling method,
Software that recently shells one character processing. I found some problems in the use of EXECryptor.
On Some xp sp3 machines, anti-debug cannot run if checked, but it can run on my notebook.
Xp sp3 in my notebook can run, but it cannot run in
The analysis is not very good. Some things have not been clearly expressed. Everyone analyzed them by themselves. This program is a process management program I wrote myself, but it has not been written yet ....UPX3.03 shelling, encryption
It is easy to use winrar for encryption, but it is still insecure if the method is not proper. For example, if the number of characters in a password is too small and the characters are too frequently used, it is especially dangerous to use only
PrefaceFor mature cms, SQL inject, and xss, all have their own defense code. However, some logic errors and misunderstandings may make system defense as a false one, this article is a case that uses global variables to cover multiple security
In the recent penetration test project, some problems have occurred in the functions of the SMS platform, and several issues related to the SMS platform on wooyun.I. No frequency limit for sending text messagesSearch on wooyun shows that this type
The website has a logic error and can be used to brush up without limit. Details: I accidentally found this site and tested it. The result shows that there is a logic error, and you can brush gold without limit. The vulnerability occurs in the place
GPL guanglida professional competition (http://www.gplcn.com/) Although it is a small competition, the number of people concerned about the small. but someone asked me to check his security. let's talk about the Registry ticket first: the
I have been learning about databases recently, and I have been studying some advanced injection syntaxes in PHP, which is quite interesting. So I found a website with holes on the Internet to practice hand injection. So we have the following. First,
You can traverse the server in the background, delete it at will, and export the trojan through MYSQL in the obtained path. The image management page in the background can traverse the entire server. Through code, we can see isset ($ dir) or $ dir =
With the development of network security technology, SQL injection is increasingly known as a popular attack method. Many websites also protect against SQL injection. Many website administrators add anti-injection programs. At this time, when we use
HTML5 removes many outdated labels, such as and , and introduces many interesting new labels, for example, the and tags allow dynamic loading of audio and video.
New tags introduced by HTML5 include , , , , and . These tags have some interesting
An inefficient SQL statement is enough to destroy the entire application. statement is the parent interface of PreparedStatement. It does not perform pre-compilation, reducing the overhead of pre-compilation. A single run of PreparedStatement is
Versions affected by the vulnerability have not been confirmed yet! In some versions, after you insert it into the file, a file will confirm the value you inserted. In that version, X is not a bird! Almost all other versions are supported! It exists
The process of uploading a CMS file is improper, so that you can control the file name and upload any file.First, check the upload page: upload images
image path: ">">">">
Pass it to upload_ OK .asp for processing. Check upload_ OK .asp source
Help a friend to detect the website, Shun found the friends of the vulnerability: from friends to get the code, install, and then visit the blog, NETWORK, you can see a such NETWORK request http://api.uyan.cc /? Url = xxxx & title = xxx & du = & pic
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.