Public Key Infrastructure promotes various departments in the security industry to maintain and improve all aspects related to PKI technology. From the root certificate authority to the X.509 certification, it proves the success in protecting the
Security Configuration 1 (1) enable the Security Mode of php is a very important embedded security mechanism that can control some php functions, such as system (), at the same time, many file operation functions are subject to permission control,
When sending a request to the openg browser to open a page, you can obtain all the data under the openg browser, including cookie information, without being root. after stealing the information, you can send it to a remote server. You can use an app
The author of VulnVPN has created http://www.rebootuser.com/, which is a very good tool. Our goal is to obtain root access to the VPN Server. This article will take you through every step of the entire process.
Set VulnVPNAnd Backtrack
VulnVPN
In our daily O & M work, Iptables is often used to set IP information packet filtering and firewall configuration. First, the Iptables configuration file is/etc/sysconfig/iptables, all rules must be written to this file. Otherwise, it will become
Kid paper. Don't worry about AV ~ The AV mentioned here is AntiVirus. That is, kill software. (These days the exam is heavy and even less ..)This article briefly introduces the commonly used kill-free tools and their usage ~0x00 HyperionFirst, let's
This next-generation firewall horizontal test, designed by the testing lab of the online world, aims to verify whether the next-generation firewall can not compromise security and performance after several years of development, effectively protects
This virus is a virus that users need to pay attention to as mentioned in the rising Website Security weekly. This article analyzes the behavior of this virus in detail.
The virus is bound to a malicious Word file. After the virus runs, it modifies
By Kungen @ CyberSword
To search for a malicious sample, you must first know the basic information required to search for the sample, includingVirus name,Sample file name,HASH Value. For the latest detected virus,SECURELIST,VirusTotalThe website
The server is equipped with the 8 Signs Firewall. PHP, ASP, and ASPX cannot be used by many pony horses. Therefore, BS horses are recommended here... Pony receiver :--------------------------------------
---------------------------------------------
A while ago, I was very busy and had some things during the 11 th holiday. As a result, I did not send a blog post or reply to the reader's message for more than 10 days. Many enthusiastic readers thought I was cross-province. Today, I quickly
Step 1: Shell check
The compiler and the compressed file are UPX shells.Step 2: ShellingTake off the tool directly.Step 3: Load olldbg1. Go to the data window in the lower right corner. Right-click-search-paste base64_decode ($ _ POST [z0]) to the
This is a tough topic in the information security competition (hdusec ctf) of Hangzhou University of Electronic Science and Technology. After running the program, the computer is automatically shut down. If the computer is directly tested on a real
The primary card is a Mifare Classic card, not an original card. Its encryption is simple and all card keys are the same. You can modify the amount by using this vulnerability and consume it on campus !! You can use the mobile phone as the read key
By Suikaly Hanzi Leo @ CyberSword
Two tools:
Office 2010, Adobe Acrobat Pro X (Acrobat ReaderNo)
Two steps:
(1)InDOCAdd a watermark and an electronic signature to the document.DOCSavePDF
(2)SetPDFAccess permission
I.Add a watermark and an electronic
I didn't expect that Discuz still had the csrf quota. During the test, I found that basically all requests had parameters such as token to prevent csrf, but I still found one and shouted. Rewards for general purposes! Kill all versions !~ I have to
File: install. php
// If we've been passed a default language, use it$install_lang = isset($_REQUEST['install_lang']) ? pun_trim($_REQUEST['install_lang']) : 'English';// If such a language pack doesn't exist, or isn't up-to-date enough to translate
The penetration test notes are mainly short but excellent penetration tips, designed to share your learning experience with your friends. To ensure quality, each article contains about 20 pieces of penetration notes. 1. A little trick to keep your
How can I build an automated code audit task in a short time? The quickest and most effective way to think of it is to find an existing best open-source callable tool for secondary development. My former colleague mm card tried all the code auditing
This is not an article about technology, but an attempt of open thinking. It mainly focuses on how to find available input points when filtering input.
In essence, to perform xss attacks, you only need to find an unfiltered Input Point. The input
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.