Network programming self-made communication gadget (with source code)

catalogue I. Introduction Second, write source code 2.1 create server and client 2.3 create function Three renderings IV. summary V. source code I. Introduction Readers can understand the code and self-made by mastering the basic knowledge of multithreading, io flow and network programming. It is very easy to understand and learn. T ...

Added by renob on Tue, 28 Dec 2021 13:59:45 +0200

[network security] bottom layer extension and production of deserialization vulnerability WebShell

XMLDecoder deserialization vulnerability underlying The reference articles have been analyzed in great detail. Here I mainly talk about the final implementation. That is, the use of the Expression class import java.beans.Expression; public class test { public static void main(String[] args)throws Exception { Parameter();//With ...

Added by Cbrams on Tue, 28 Dec 2021 05:50:04 +0200

CentOS 7 firewall policy configuration necessary for operation and maintenance beginners

CentOS 7 firewall policy configuration necessary for operation and maintenance beginners 1. Preface: All distributions above CentOS 7 try to bring their own firewalld firewall, and firewalld brings iptables firewall. The reason is that the firewall policy of iptables is handled by the netfilter network filter at the kernel level, while firewa ...

Added by DigitalExpl0it on Mon, 27 Dec 2021 20:58:04 +0200

Local socket (domain) communication

socket IPC    socket API was originally designed for network communication, but later developed an IPC mechanism based on the socket framework, namely UNIX Domain Socket. Although the network socket can also be used for interprocess communication of the same host (through loopback address 127.0.0.1), but UNIX Domain Socket is mor ...

Added by baennaeck on Sun, 26 Dec 2021 13:09:45 +0200

Introduction to encryption and decryption

Encryption and decryption is nothing more than ensuring data security. Three problems need to be solved to ensure data security: Confidentiality, integrity, authentication (anti forgery and denial) Confidentiality: the transmission content is not in clear text. Even if the data is intercepted by the outside world, it cannot be interprete ...

Added by genie on Sat, 25 Dec 2021 23:12:54 +0200

Network communication data transmission TCP/IP model PORT IP

Network communication data transmission TCP/IP model PORT IP Network programming: connect computers distributed in different geographical regions with special external equipment with communication lines to form a large-scale and powerful network system, so that many computers can easily transfer information to each other and share hardware, so ...

Added by doucie on Sat, 25 Dec 2021 22:20:47 +0200

socket programming process and function explanation

1, Create socket socket is a readable, writable, controllable and closable file descriptor (integer number) // Function prototype int socket(int domain, int type, int protocol) //Parameter interpretation domain: Specifies the protocol used by the system. Can be TCP/IP Protocol family, or UNIX Protocol family. The corresponding values are ...

Added by mullz on Sat, 25 Dec 2021 19:33:33 +0200

Basic routing policy configuration of routing Foundation

Basic routing policy configuration Principle overview: Route policy is widely used. For example, it can specify that the router only publishes some routes that meet specific conditions when publishing routes, only receives some routes that 1 meet specific conditions when receiving routes, only introduces some routes that meet specific co ...

Added by phencesgirl on Sat, 25 Dec 2021 14:16:45 +0200

BGP advanced features overview (Huawei DataCome)

Routing control BGP route control includes controlling the release and reception of routes. BGP routing control is generally realized through routing policy, that is, specific routes are matched through the routing matching tool, and the release and reception of routes are controlled through the routing policy tool Route matching tools: ACL ...

Added by knighthawk1337 on Sat, 25 Dec 2021 08:39:26 +0200

Part of the first "Hecheng Cup" Henan Hebi CTF network security challenge

The first "Hecheng Cup" Henan Hebi CTF network security challenge Official account: Th0r security 1 $ tshark -r timu.pcapng http|grep ' GET ' > timu-get $ for i in `seq 1 30`; do a=`grep "),$i,1)" timu-get|tail -1|cut -d= -f3|cut - d- -f1`;b=`printf "%x" $a`;echo -n $b; done 666c61677b77317265736841524b5f657a5f31736e74697 ...

Added by chadu on Sat, 25 Dec 2021 04:47:16 +0200