Disclaimer: the programs in this post are for learning purposes only and cannot be used for illegal purposes. Otherwise, the consequences will be borne by you. It has nothing to do with me!I will not crack this time. I will only analyze its
For work reasons, we recently used the Remote Security Assessment System of lumeng. Later we studied and found that the system's anti-cracking function is still very powerful. I tried multiple methods and failed.Now, let's write down two aspects
1. let's take a look at how the web. write the database connection string in config. open web. config file. by default, the config file contains two configuration sections: "," ". You can write connection strings in both configuration sections,
1 CPU Composition
CPU can be roughly divided into the following three parts:
(1) The arithmetic logic Part ALU (arithmetic logic unit) is used for arithmetic and logical operations.
(2) control logic.
(3) working register, each register is
To Draren Summary of ollydbg v1.09d Chinese Version instructions for use
The accumulation of 1.1 drops will happen.
Choose ollydbg
1. My OS is winXP and trw2000 cannot be used. However, softice fails to be installed multiple times, and the blue
[Cracking tool] OD, Calculator[Cracking platform] WINXP[Software Overview] Difficulty: 2-Needs a little brain (or luck)Platform: WindowsLanguage: Assembler
----------------------------------------------------------------------CRACKME is very
[Detailed process]This is a pure entertainment crackme. It was presented to all colleagues who attended the snow Forum as a Christmas gift on the riijj TV platform. At the beginning, the level was not enough. I saw that the floating point Command
[Article Title]: notes taken by cainiao from ExeCryptor[Author]: machengin[Software name]: pm[Software size]: 1.9 MB[]: Search and download by yourself[Shelling method]: ExeCryptor[Protection method]: ExeCryptor[Language]: Borland Delphi[Tools]:
Twisters (foxyfish # qq.com)
This is my first time writing this kind of stuff. Sorry for any disadvantages. The program to be cracked is included in the attachment.Run the program first.Registration machine image= 800) window. open (http://www.bkjia.
Advanced WMA Workshop 2.04b simple SHELL CRACKING
The program shelling with asp1.24rc4 and using the time protection of Shell
Author: lordorQQ: 88378557Mail: lordor # 163.comFrom: www.digitalnuke.comNote: The method for finding the Stolen code of
Yinggao's standardized management system is a common access control device. However, it has multiple vulnerabilities that allow access bypass and affect Intranet security.Login username Input
Aaa' and (select 1 from (select count (*), concat
Kr is a popular bbs. Only Smecta injection in the background ~ This injection belongs to the injection after order. It can be executed by order by a (select statement. In this case, the select statement in parentheses is only used as a subquery.
You can reset your password by brute force. You only need to know your mobile phone number, which is a vulnerability, but it is also a vulnerability. In fact, vendors can pay more attention to wooyun. the vulnerabilities of the same function are
Version: SiteServer CMS 3.5 background, uploads a GIF Trojan. then, you can modify the file name through website file management to change the image Trojan format **. aspx version: SiteServer CMS 3.5
1. Replace the expression in the style with the fullwidth character only for the xss that is valid for IE6. IE6 2, IE6-IE8, IE9 compatible mode valid xss, insert the following code, when you click test, the xss is triggered. test 3, only later
1. Storage-type xss 1) The manufacturer fixed the xss for sharing images, and another storage-type xss was available in the new feature;2) click Publish to upload images. 3) upload an image and capture the package. The complete img Tag also exists. 4
ExternalInterface. the first parameter of the call, we will talk about the "2" parameter next, the reason why the quotation marks 2, because the prototype of the call function is: call (functionName: String ,... arguments): *, which can be followed
Client-Side JS Overriding Limitations
What is PhantomJS
Using PhantomJS for Server-Side XSS Detection
Server-Side JS Overriding
Example Testing
Access Attempts for documentcookie DOM Object
Request Mimicking with PhantomJS
XSSAuditor
Affected products: glFusion developer: http://www.glfusion.org/defect impact: 1.2.2 and probably prior tested version: 1.2.2Advisory Details: High-Tech Bridge Security Research Lab discovered multiple XSS vulnerabilities in glFusion, which can be
Writing this article only provides an idea and does not include any other force installation components ~
Www.tvxqlover.com
It is said that some day, good friends suddenly wanted to hook up a page for the Eastern God to mourn the old feeling of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.