suricata what each thread does -- FlowManagerThread
catalogue
Thread initialization
Stream management logic processing function
Main cycle
Get timed out stream
Processing timed out streams
Other timeout
Thread exit
For the relationship between the creation of flow management thread and the registered slot and TmModule, see the section on creating sub threads of non working threads in my ...
Added by reapfyre on Sat, 15 Jan 2022 02:45:50 +0200
A security vulnerability analysis
Vulnerability analysis
The environment is built with vulhub. The version is
Confluence Server 6.10.2
Widget Connector is a plug-in of Confluence. Compare the plug-ins before and after repair
Left Confluence 6.13.0 right 6.13.3
widgetconnector-3.1.0.jar!\com\atlassian\confluence\extra\widgetconnector\WidgetMacro.class
You can see that th ...
Added by romeo on Sat, 15 Jan 2022 02:27:52 +0200
JAVA code audit -- XXE external entity injection
WEB SecurityTo understand XXE, you need to understand the basics of XML before thatXML FoundationXML syntaxAll XML elements must have a close tagXML tags are case sensitiveXML must be nested correctlyThe XML document must have a root elementXML attribute values must be quotedFor entity references, there may be < > symbols in tag attribute ...
Added by rahulephp on Wed, 12 Jan 2022 22:58:45 +0200
Network protection notes -- XSS vulnerability exploitation
Browser homology policy
summary
In 1995, the same origin policy was introduced by Netscape. At present, all browsers implement this policy. Initially, it means that the Cookie set by page A and page B cannot be opened unless the two pages are "homologous". The so-called "homology" refers to "three sameness": ...
Added by fahhem on Wed, 12 Jan 2022 20:15:02 +0200
Digital signature application
introduction Digital signature can ensure the integrity and non repudiation of file data. This time, we will use the Java language to realize the digital signature and verification of files. The JDK of the Java language provides a rich cryptography class library. Elliptic curve ECDSA digital signature algorithm and SHA256 hash algorithm are ad ...
Added by rhyspaterson on Wed, 12 Jan 2022 09:31:18 +0200
Linux firewall -- enterprise configuration strategy of IPtables
1, Introduction to firewall
Firewall definition: it is a technology that helps the computer network build a relatively isolated protection barrier between its internal and external networks by organically combining various software and hardware equipment for security management and screening, so as to protect the security of user data and infor ...
Added by pcwizzzz on Tue, 11 Jan 2022 15:56:06 +0200
Information security | analysis of malicious document samples using oletools Python
preface
After learning oletools python, you can perform basic analysis on malicious document samples.
What is oletools Python
Oletools Python tool is used to analyze MS OLE2 files (structured storage, composite file binary format) and MS Office documents for malware analysis, forensics and debugging.
Download and install
Linux,Mac: sudo ...
Added by shaymol on Sun, 02 Jan 2022 20:50:42 +0200
[network security] bottom layer extension and production of deserialization vulnerability WebShell
XMLDecoder deserialization vulnerability underlying
The reference articles have been analyzed in great detail. Here I mainly talk about the final implementation. That is, the use of the Expression class
import java.beans.Expression;
public class test {
public static void main(String[] args)throws Exception {
Parameter();//With ...
Added by Cbrams on Tue, 28 Dec 2021 05:50:04 +0200
Attack and defense world crypto novice zone wp
base64 (base password)
Learn about base64 first: The result of base64 encoding is a string, in which the characters can include A-Z, A-Z, 0-9, +, \ a total of 64 characters. If these characters appear, consider base64. Generally, if there is = (filling character) after it, it can be determined as base64!
Y3liZXJwZWFjZXtXZWxjb21lX3RvX25ld1 ...
Added by jd023 on Mon, 27 Dec 2021 01:45:42 +0200
Record a survey and solution of mykings-dark cloud mining Trojan horse
WeChat Public Number: Operations and Maintenance Development Story, Author: wanger
cause
The firewall of a Windows server 2012 Ali Cloud Server that was tested before always starts after it is shut down. After thinking about many ways and without finding the reason, I asked the worksheet for the sale, and found no problems after the sale, a ...
Added by MA06 on Sun, 26 Dec 2021 14:48:53 +0200