JAVA serialization and deserialization and vulnerability remediation
Last week, cyber security staff suffered a further setback in front of the black market. Joomla exposed high-risk 0-day vulnerabilities, which can be triggered without user login.
Hacker writes Haka-Part 1
Haka is an open-source network security-oriented language that can be used to write security rules and Protocol delimiters. In this section, we focus on writing security rules.0x00 what is Haka
Haka is an open-source
RHEL & CentOS & OEL5 & 6.x high-risk vulnerability repair
This article only targets the aligreennet vulnerability scan results. The following high-risk vulnerabilities exist in RHEL, CentOS, and OEL5.x x64. The solutions are provided here. After a
A Zoomla system vulnerability causes Server Control
A Zoomla system vulnerability causes the server to be controllable (You have logged on to Zoomla's email address and the official old forum administrator account)A series of problems caused by the
Light stop parking skipped payment completed order and refund to account (Brush parking fee)
Light stop parking, due to business logic design defects, you can directly skip the payment steps to complete the parking space booking, at the same time,
Linux malware analysis and learning skills
Linux malware should be very small compared to windows, In the http://malwaredb.malekal.com/virus library site in dozens of hundreds of virus samples will appear in a linux sample. I will summarize and
Example of starting or stopping a shell script in centos
#! /Bin/bash # The next lines are for chkconfig on RedHat systems. # chkconfig: 35 98 02 # description: Starts and stops Server # The next lines are for chkconfig on SuSE systems. #/etc/init.
Use Python Shells to bypass anti-virus software
1. bypass anti-virus software
Why?
1. Bypassing anti-virus software is safer than disabling anti-virus software;
2. demonstrate how fragile and interesting anti-virus software on the client is.
How?
If
Linux system full encryption startup attack, linux encryption attack
Attack
Since there are no ready-made tools on the market that can perform such attacks, we have made our own tools and named them EvilAbigail. Edevil maid attacks can be targeted
711 weak software Station Service password getshell
Rt
Weak phpmyadmin password getshellRoot/root
It took a little effort to write a shell, and it was useless for dogs and horses. Later, my teammates reminded meWrite your website as .jpg -------
Media services on meizu mobile phones can produce SQL Injection
Media services on meizu mobile phones can generate SQL injection.
When the file name is enclosed in quotation marks, the Media Service may have the risk of SQL injection. The direct
A talent Employment Network SQL injection (DBA permission)
A talent employment network in a city can inject SQL statements, leading to a large amount of information leakage. The DBA permission can be directly revoked from the shell.
Http: // **.
Activity row design defects can be logged on to other user accounts
Sign up for the meeting of tangscan. It is easy to use the activity line, so I simply read it...
The title is obviously too vague for others to directly discover problems. The
An SQL injection vulnerability exists in a substation of levision.
An SQL injection vulnerability exists in a substation of levision.
Http://app.m.letv.com/android/mindex.phtml? Version = 3.3.0.1 & pcode = 010110106 & mod = minfo & ctl = video & act
China energy conservation and environmental protection group company email system design defects credential stuffing cracking has obtained multiple account permissions (internal information, sensitive information)
RT
China energy conservation and
Webshell Security Detection (4)-traffic-based Webshell analysis example1. Typical operations
After a full introduction to the previous articles, I think everyone has some knowledge about how to detect webshells. Today we will discuss how to detect
Use of htran and socks4-Intranet penetration
In Intranet penetration, it is necessary to rebound the socks proxy. We all know that lcx is used to forward ports. It seems that few people directly connect to the proxy. Because we want to connect to
When network spying is applied to counter terrorism, data flow sorting is crucial.
The original intention and foundation of all intelligence warfare means lies in strengthening national defense. This article discusses the progress made by
Introduction to serial data capture and serial communication simulation
0x00 Preface
Most of the serial communication is fixed, so most attacks mainly involve capturing data and simulating communication. How to determine whether it is the easiest
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.