suricata what each thread does -- FlowManagerThread

catalogue Thread initialization Stream management logic processing function Main cycle Get timed out stream Processing timed out streams Other timeout Thread exit For the relationship between the creation of flow management thread and the registered slot and TmModule, see the section on creating sub threads of non working threads in my ...

Added by reapfyre on Sat, 15 Jan 2022 02:45:50 +0200

A security vulnerability analysis

Vulnerability analysis The environment is built with vulhub. The version is Confluence Server 6.10.2 Widget Connector is a plug-in of Confluence. Compare the plug-ins before and after repair Left Confluence 6.13.0 right 6.13.3 widgetconnector-3.1.0.jar!\com\atlassian\confluence\extra\widgetconnector\WidgetMacro.class You can see that th ...

Added by romeo on Sat, 15 Jan 2022 02:27:52 +0200

JAVA code audit -- XXE external entity injection

WEB SecurityTo understand XXE, you need to understand the basics of XML before thatXML FoundationXML syntaxAll XML elements must have a close tagXML tags are case sensitiveXML must be nested correctlyThe XML document must have a root elementXML attribute values must be quotedFor entity references, there may be < > symbols in tag attribute ...

Added by rahulephp on Wed, 12 Jan 2022 22:58:45 +0200

Network protection notes -- XSS vulnerability exploitation

Browser homology policy summary In 1995, the same origin policy was introduced by Netscape. At present, all browsers implement this policy. Initially, it means that the Cookie set by page A and page B cannot be opened unless the two pages are "homologous". The so-called "homology" refers to "three sameness": ...

Added by fahhem on Wed, 12 Jan 2022 20:15:02 +0200

Digital signature application

introduction Digital signature can ensure the integrity and non repudiation of file data. This time, we will use the Java language to realize the digital signature and verification of files. The JDK of the Java language provides a rich cryptography class library. Elliptic curve ECDSA digital signature algorithm and SHA256 hash algorithm are ad ...

Added by rhyspaterson on Wed, 12 Jan 2022 09:31:18 +0200

Linux firewall -- enterprise configuration strategy of IPtables

1, Introduction to firewall Firewall definition: it is a technology that helps the computer network build a relatively isolated protection barrier between its internal and external networks by organically combining various software and hardware equipment for security management and screening, so as to protect the security of user data and infor ...

Added by pcwizzzz on Tue, 11 Jan 2022 15:56:06 +0200

Information security | analysis of malicious document samples using oletools Python

preface After learning oletools python, you can perform basic analysis on malicious document samples. What is oletools Python Oletools Python tool is used to analyze MS OLE2 files (structured storage, composite file binary format) and MS Office documents for malware analysis, forensics and debugging. Download and install Linux,Mac: sudo ...

Added by shaymol on Sun, 02 Jan 2022 20:50:42 +0200

[network security] bottom layer extension and production of deserialization vulnerability WebShell

XMLDecoder deserialization vulnerability underlying The reference articles have been analyzed in great detail. Here I mainly talk about the final implementation. That is, the use of the Expression class import java.beans.Expression; public class test { public static void main(String[] args)throws Exception { Parameter();//With ...

Added by Cbrams on Tue, 28 Dec 2021 05:50:04 +0200

Attack and defense world crypto novice zone wp

base64 (base password) Learn about base64 first: The result of base64 encoding is a string, in which the characters can include A-Z, A-Z, 0-9, +, \ a total of 64 characters. If these characters appear, consider base64. Generally, if there is = (filling character) after it, it can be determined as base64! Y3liZXJwZWFjZXtXZWxjb21lX3RvX25ld1 ...

Added by jd023 on Mon, 27 Dec 2021 01:45:42 +0200

Record a survey and solution of mykings-dark cloud mining Trojan horse

WeChat Public Number: Operations and Maintenance Development Story, Author: wanger cause The firewall of a Windows server 2012 Ali Cloud Server that was tested before always starts after it is shut down. After thinking about many ways and without finding the reason, I asked the worksheet for the sale, and found no problems after the sale, a ...

Added by MA06 on Sun, 26 Dec 2021 14:48:53 +0200