JAVA serialization and deserialization and vulnerability remediation

JAVA serialization and deserialization and vulnerability remediation Last week, cyber security staff suffered a further setback in front of the black market. Joomla exposed high-risk 0-day vulnerabilities, which can be triggered without user login.

Hacker writes Haka-Part 1

Hacker writes Haka-Part 1 Haka is an open-source network security-oriented language that can be used to write security rules and Protocol delimiters. In this section, we focus on writing security rules.0x00 what is Haka Haka is an open-source

Juniper screnos VPN decryption Information Leakage Vulnerability (CVE-2015-7756)

cve

Juniper screnos VPN decryption Information Leakage Vulnerability (CVE-2015-7756)Juniper screnos VPN decryption Information Leakage Vulnerability (CVE-2015-7756) Release date:Updated on:Affected Systems: Juniper Networks ScreenOS

RHEL & amp; CentOS & amp; OEL5 & amp; 6.x high-risk vulnerability repair

cve

RHEL & CentOS & OEL5 & 6.x high-risk vulnerability repair This article only targets the aligreennet vulnerability scan results. The following high-risk vulnerabilities exist in RHEL, CentOS, and OEL5.x x64. The solutions are provided here. After a

A Zoomla system vulnerability causes Server Control

A Zoomla system vulnerability causes Server Control A Zoomla system vulnerability causes the server to be controllable (You have logged on to Zoomla's email address and the official old forum administrator account)A series of problems caused by the

Light stop parking skipped payment completed order and refund to account (Brush parking fee)

Light stop parking skipped payment completed order and refund to account (Brush parking fee) Light stop parking, due to business logic design defects, you can directly skip the payment steps to complete the parking space booking, at the same time,

Linux malware analysis and learning skills

Linux malware analysis and learning skills Linux malware should be very small compared to windows, In the http://malwaredb.malekal.com/virus library site in dozens of hundreds of virus samples will appear in a linux sample. I will summarize and

Example of starting or stopping a shell script in centos

Example of starting or stopping a shell script in centos #! /Bin/bash # The next lines are for chkconfig on RedHat systems. # chkconfig: 35 98 02 # description: Starts and stops Server # The next lines are for chkconfig on SuSE systems. #/etc/init.

Use Python Shells to bypass anti-virus software

Use Python Shells to bypass anti-virus software 1. bypass anti-virus software Why? 1. Bypassing anti-virus software is safer than disabling anti-virus software; 2. demonstrate how fragile and interesting anti-virus software on the client is. How? If

Linux system full encryption startup attack, linux encryption attack

Linux system full encryption startup attack, linux encryption attack Attack Since there are no ready-made tools on the market that can perform such attacks, we have made our own tools and named them EvilAbigail. Edevil maid attacks can be targeted

711 weak software Station Service password getshell

711 weak software Station Service password getshell Rt Weak phpmyadmin password getshellRoot/root It took a little effort to write a shell, and it was useless for dogs and horses. Later, my teammates reminded meWrite your website as .jpg -------

Media services on meizu mobile phones can produce SQL Injection

Media services on meizu mobile phones can produce SQL Injection Media services on meizu mobile phones can generate SQL injection. When the file name is enclosed in quotation marks, the Media Service may have the risk of SQL injection. The direct

A talent Employment Network SQL injection (DBA permission)

A talent Employment Network SQL injection (DBA permission) A talent employment network in a city can inject SQL statements, leading to a large amount of information leakage. The DBA permission can be directly revoked from the shell. Http: // **.

Activity row design defects can be logged on to other user accounts

Activity row design defects can be logged on to other user accounts Sign up for the meeting of tangscan. It is easy to use the activity line, so I simply read it... The title is obviously too vague for others to directly discover problems. The

An SQL injection vulnerability exists in a substation of levision.

An SQL injection vulnerability exists in a substation of levision. An SQL injection vulnerability exists in a substation of levision. Http://app.m.letv.com/android/mindex.phtml? Version = 3.3.0.1 & pcode = 010110106 & mod = minfo & ctl = video & act

China energy conservation and environmental protection group company email system design defects credential stuffing cracking has obtained multiple account permissions (internal information, sensitive information)

China energy conservation and environmental protection group company email system design defects credential stuffing cracking has obtained multiple account permissions (internal information, sensitive information) RT China energy conservation and

Webshell Security Detection (4)-traffic-based Webshell analysis example

Webshell Security Detection (4)-traffic-based Webshell analysis example1. Typical operations After a full introduction to the previous articles, I think everyone has some knowledge about how to detect webshells. Today we will discuss how to detect

Use of htran and socks4-Intranet penetration

Use of htran and socks4-Intranet penetration In Intranet penetration, it is necessary to rebound the socks proxy. We all know that lcx is used to forward ports. It seems that few people directly connect to the proxy. Because we want to connect to

When network spying is applied to counter terrorism, data flow sorting is crucial.

When network spying is applied to counter terrorism, data flow sorting is crucial. The original intention and foundation of all intelligence warfare means lies in strengthening national defense. This article discusses the progress made by

Introduction to serial data capture and serial communication simulation

Introduction to serial data capture and serial communication simulation 0x00 Preface Most of the serial communication is fixed, so most attacks mainly involve capturing data and simulating communication. How to determine whether it is the easiest

Total Pages: 1330 1 .... 753 754 755 756 757 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.