Java Security Learning Notes -- deserialization vulnerability utilization chain CC6 chain

Test environment: jdk1.8(jdk8u71) Commons Collections4.0 HashSet HashSet uses the data structure of the Hash table. The time complexity of adding, deleting, modifying and querying is O(1). Set is a set. The elements are not added in order, and there will be no duplicate elements in the set. Combined with this, we can roughly know the ...

Added by 2DaysAway on Mon, 24 Jan 2022 15:14:16 +0200

Apache common collections with Java deserialization vulnerability

Apache common collections with Java deserialization vulnerability Gongzong No.: Black palm A blogger who focuses on sharing network security, hot spots in the hacker circle and hacker tool technology area! preface: Recently, I calmed down and read a lot of Daniel's notes and blogs. I have gained a lot, so I'd like to record the first ...

Added by messer on Sun, 23 Jan 2022 23:39:34 +0200

National Division awd post game Summary - feel at ease to be an awd bastard

Reprinted in the security guest I sent ha ~, if you are interested, you can click the link https://www.anquanke.com/post/id/245158 Safe guest - thoughtful safe new media Recently, I participated in the national division competition. My division happens to be the awd competition system, so I summarized the basic exercises about awd to facilitat ...

Added by new2phpcode on Sat, 22 Jan 2022 19:06:09 +0200

fierce! Avoid killing any EXE

Gongzong No.: black palm A blogger who focuses on sharing network security, hot spots in the hacker circle and hacker tool technology area! PE file Brief description of PE documents The full name of PE file is Portable Executable, which means Portable Executable file. Common exe, DLL, OCX, SYS and COM are PE files. PE file is a program fil ...

Added by jane on Thu, 20 Jan 2022 23:03:16 +0200

034 PHP foundation, variables, operators, process control

1: Basic overview of php The syntax of PHP absorbs the characteristics of popular computer languages such as C language, Java and Perl, which is easy for ordinary programmers to learn The main goal of PHP is to allow web developers to write dynamic pages quickly Simply put, PHP is mainly used to develop various types of website programs S ...

Added by Sangre on Thu, 20 Jan 2022 13:54:26 +0200

Source code analysis of several niche web fingerprint identification tools

Gongzong No.: black palm A blogger who focuses on sharing network security, hot spots in the hacker circle and hacker tool technology area! Webfinger brief introduction This is a very small tool, written by Python 2, using Fofa's fingerprint library Github address: https://github.com/se55i0n/Webfinger Please refer to the official screensh ...

Added by avianrand on Wed, 19 Jan 2022 17:28:18 +0200

Some people say that SQL injection has been eliminated. Can you beat him???

Last time I wrote an article about SQL injection, someone said that SQL injection is outdated!!! preface: This time, four interesting practical cases are used: Hard - common getshell Fast - fast error injection Quasi - injected under the limit of character length 100 Around – around a university safety dog Although there are only four ...

Added by lukemedway on Tue, 18 Jan 2022 00:14:13 +0200

Network security is based on the sketch framework and selenium and openpyxl libraries to crawl the epidemic statistics and summary information of foreign countries

Network security is based on the sketch framework and selenium and openpyxl libraries to crawl the epidemic statistics and summary information of foreign countries data sources https://voice.baidu.com/act/newpneumonia/newpneumonia/ thinking Because the data in the target page is dynamically loaded, the response obtained by directly initiatin ...

Added by visionmaster on Sun, 16 Jan 2022 10:08:54 +0200

Guard notes -- deserialization

Due to my weak foundation, I can only make simple records for the time being, which will be supplemented after more detailed explanation and repetition exercises. Deserialization serialize Serialization is the process of converting an object state into a format that can be maintained or transmitted. The opposite of serialization is deserializ ...

Added by zyntrax on Sun, 16 Jan 2022 05:05:48 +0200

Beginner BGP protocol experiment

Experimental topic All routers in the network run BGP protocolAll PC s can access each other Topology construction Experimental ideas Enable OSPF protocol in AS 2 to realize internal routing interworkingAS1 and AS2, AS2 and AS3 are adjacent to EBGP, All routers in AS2 are built adjacent to iBGP (in order to avoid routing black holes, al ...

Added by masalastican on Sat, 15 Jan 2022 13:09:42 +0200