Several kinds of common cryptographic attacks in WEB

reference resources: https://www.freebuf.com/articles/database/151167.html https://www.jianshu.com/p/7f171477a603Because it involves cryptography, I have a big head. Let's record it.Padding oracle attack and CBC flip byte attackXOR (XOR)What is XOR? XOR is an operation method, which is briefly summarized as the same false different truetrue xor ...

Added by PrinceOfDragons on Fri, 11 Feb 2022 10:14:07 +0200

Introduction to the use of sqlmap

1, sqlmap get target1. Introduction to SQL injectionThe so-called SQL injection is to cheat the server to execute malicious SQL commands by inserting SQL commands into the web form to submit or enter the query string of domain name or page request. Specifically, it is the ability to inject SQL commands into the background database engine by usi ...

Added by robert_a89 on Fri, 11 Feb 2022 10:13:47 +0200

Express security verification -- password encryption and authentication

bcrypt password encryption In practical applications, it is not safe to store user passwords directly in plaintext. Here is how to use password parsing and parsing Installing the bcrypt module yarn add bcrypt Encryption and parsing function You need to encapsulate promise to avoid errors caused by asynchrony exports.hash = (myPlaintex ...

Added by wellmoon on Fri, 11 Feb 2022 10:10:44 +0200

JUCxu Learning Arrangement

JUC Knowledge Point-Complete Set What is juc? java.util.concurrentjava.util.concurrent.locksLock-related API sjava.util.concurrent.atomicAtomic operation apiThread Safe and Flexible JUC classification summary? lockReentrantLock, ReadWriteLock, StampedLock, Wait for Condition notification, Block wake-up LockSupportAtomsBasic Type, Array Type, ...

Added by printf on Fri, 11 Feb 2022 09:54:44 +0200

Several common postures for handling exceptions in SpringBoot

1. Use @ ControllerAdvice , and @ ExceptionHandler , to handle global exceptions This is a commonly used method at present, which is highly recommended. Junit 5 is used in the test code. If you create a new project to verify the following code, remember to add relevant dependencies. 1. Create an exception information entity class Non essen ...

Added by panic! on Fri, 11 Feb 2022 09:49:32 +0200

Operating system: banker algorithm

Report Download Code download 1. Problem description 1.1 banker algorithm The applicant shall state in advance the maximum demand for various resources. When dynamically applying for a certain type of resources during process activities, the system reviews whether the number of existing resources in the system can meet the maximum demand of ...

Added by ryanbutler on Fri, 11 Feb 2022 09:48:15 +0200

New version of silly girl + docking onebot protocol + docking Qinglong tutorial

70% of this article is reprinted and 30% is supplemented. Original text: 2022 new and complete version of Qinglong panel docking robot, and silly girl docking onebot(oicq) protocol realizes robot function_ Dabei's Programming Notes blog - CSDN blog_ Qinglong panel qq robot Solve bash: /root/sillyGirl/sillyGirl: insufficient permissions and ws ...

Added by akillez on Fri, 11 Feb 2022 09:46:13 +0200

MyBatis learning: advanced query (one-to-one mapping)

1, One to one mapping Suppose that in the permission system, a user can only have one role, that is, the relationship between users and roles is limited to one-to-one relationship. 1.1 handling one-to-one relationships using automatic mapping A user has a role. We add the role class SysRole field in the user class SysUser. As follows: publi ...

Added by djelica on Fri, 11 Feb 2022 09:45:56 +0200

Python digital analog notes Sklearn sample cluster analysis

1. Classification of classification Classification of classification? Yes, there are different kinds of classification, and it is often confused in the fields of mathematical modeling and machine learning. First of all, let's talk about Supervised learning and Unsupervised learning. Does it mean that there are no teachers and Discipline Inspe ...

Added by semlabs on Fri, 11 Feb 2022 09:33:14 +0200

Dynamic web pages - reverse analysis + cases

Introduction: this chapter mainly explains the related technologies of dynamic web page crawling. The crawling of dynamic web pages mainly includes reverse analysis method and simulation method. Today, we will mainly introduce the reverse analysis method. Later, we will focus on the use of selenium Library in the simulation method. Dynamic ...

Added by JonathanS on Fri, 11 Feb 2022 09:32:07 +0200