Author: eyasEmail: eyas at xfous.orgDate: 2004-11-08
Some time ago, the ADSL password was forgotten, but fortunately it was stored in the dial-up connection, so I found some asterisks and passwords on the Internet.The display tool does not work.
As a classic FTP server software, SERV-U has been used by most administrators, its simple installation and configuration and the powerful management functions of the humanization has been praised by administrators. However, as the number of users
My network is like this! One FC3 instance and three win2000 instances form a LAN! All four machines are connected to a m vswitch. On FC3, two NICs eth0 are connected to the Internet, and adsl eth1 are connected to the vswitch. FC3 is used for nat
I often use wireless cracking on n900 and summarize some methods for cracking the WEP Key.
Method 1:Ifconfig wlan0 downIwconfig wlan0 mode monitorIfconfig wlan0 upAirodump-ng wlan0 scans wireless signalsWireless MAC to be cracked by the channel (ivs
1. single-byte SQL Injection
Mysql SQL injection has been around for a long time. The following are the common injection steps:
1. Add/* or # To the GET parameter to determine whether the database is mysql. For
This article is published in Hacker defenseAuthor: KyranTranslator: riusksk:Http://riusksk.blogbus.com)1. PrefaceXSS (Cross-Site Scripting) attacks are mainly divided into two types: persistent (permanent type), which is stored on the server, but
Anti-DDoS proHttp://www.asp300.com/View/10/27310.html under source codeOfficial http://wljy.prinfo.cn/Vulnerability level: highVulnerability description:
The problem with this program is that username is not filtered out in user/user_errtxt.asp.
''''
Security Technical Team for the era of Bugging Security Team vulnerabilities [B .S. T]Official Address: http://bugging.com.cnAffected Versions:Powered by Discuz! Less than NT 2.6Program introduction:Discuz! NT is a powerful community software under
Today, my friend sent a website source code saying it was downloaded from the internet. I simply looked at it and found thatThere is a backdoor code in index_server_list.asp. The specific code is as follows. I believe Baidu can also find many
PurrethIn the process of website intrusion, sometimes when submitting our Trojan or other ASP files, it will be intercepted by the first-class information monitoring system, because it sets a limit on submission characters, since it does not allow
Mysterious little strong & 1943
Plug-in version: 2.2 2.5
Register a forum IDThe following code is submitted by IE:
Blackband. php? Mode = yule & action = enjoy & id = 2 and 1 = 2 union select 1, 0x2D312C67726F757069643D312C61646D696E69643D31, 3, 4
Links blog
One day, I went to mi and watched exp go to an organization and register it.
E. It took me a lot of time, but it was still a bit rewarding. It is found that the difference between foreign countries and China is really far away
Microsoft's
Cast s Blog
Cast and yijian talk about this problem. yijian says to write an article and send it for your convenience.
Occasionally saw the ewebeditor v6.0.0 vulnerability: http://www.bkjia.com/Article/200902/31706.html
I tried to build a local
Analysis Source:Know Security (http://www.scanw.com/blog)
Threat nature:IntranetThe JS function playswf can dynamically create a flash player container ( ), the created flash player container mistakenly uses the allowScriptAccess attribute. The
Tosec Security Team Blog
Recently, the Internet published a report about web attacks,
For details, refer to our focus news.
Check whether there is an injection method in the injection tool such as "and 1 = 2". But if the test does not exist, is
Author: Nobug32
We generally start with the file system in terms of the NTFS permission. In my opinion, this should be a misunderstanding. The more deeply you focus on the file system, the more difficult it will be.
A file system is required to
From: Blue Light _ Information SecurityAbout js parameter transfer, in
Trajon. BWLs HII saw this article. To be honest, it looks strange.Are all asp? Id = 111But html? Id = 111In fact, only html is used to display asp content. Several years ago,
Why?
C9 static article publishing system version 2.3.8 does not strictly filter messages, resulting in inserting a sentence
Code:
Names = funstrs (request. Form ("names "))Code = funstrs (request. Form ("mg "))Title = funstrs (request. Form
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.