Network programming self-made communication gadget (with source code)
catalogue
I. Introduction
Second, write source code
2.1 create server and client
2.3 create function
Three renderings
IV. summary
V. source code
I. Introduction
Readers can understand the code and self-made by mastering the basic knowledge of multithreading, io flow and network programming. It is very easy to understand and learn. T ...
Added by renob on Tue, 28 Dec 2021 13:59:45 +0200
[network security] bottom layer extension and production of deserialization vulnerability WebShell
XMLDecoder deserialization vulnerability underlying
The reference articles have been analyzed in great detail. Here I mainly talk about the final implementation. That is, the use of the Expression class
import java.beans.Expression;
public class test {
public static void main(String[] args)throws Exception {
Parameter();//With ...
Added by Cbrams on Tue, 28 Dec 2021 05:50:04 +0200
CentOS 7 firewall policy configuration necessary for operation and maintenance beginners
CentOS 7 firewall policy configuration necessary for operation and maintenance beginners
1. Preface:
All distributions above CentOS 7 try to bring their own firewalld firewall, and firewalld brings iptables firewall. The reason is that the firewall policy of iptables is handled by the netfilter network filter at the kernel level, while firewa ...
Added by DigitalExpl0it on Mon, 27 Dec 2021 20:58:04 +0200
Local socket (domain) communication
socket IPC
socket API was originally designed for network communication, but later developed an IPC mechanism based on the socket framework, namely UNIX Domain Socket. Although the network socket can also be used for interprocess communication of the same host (through loopback address 127.0.0.1), but UNIX Domain Socket is mor ...
Added by baennaeck on Sun, 26 Dec 2021 13:09:45 +0200
Introduction to encryption and decryption
Encryption and decryption is nothing more than ensuring data security. Three problems need to be solved to ensure data security:
Confidentiality, integrity, authentication (anti forgery and denial)
Confidentiality: the transmission content is not in clear text. Even if the data is intercepted by the outside world, it cannot be interprete ...
Added by genie on Sat, 25 Dec 2021 23:12:54 +0200
Network communication data transmission TCP/IP model PORT IP
Network communication data transmission TCP/IP model PORT IP
Network programming: connect computers distributed in different geographical regions with special external equipment with communication lines to form a large-scale and powerful network system, so that many computers can easily transfer information to each other and share hardware, so ...
Added by doucie on Sat, 25 Dec 2021 22:20:47 +0200
socket programming process and function explanation
1, Create socket
socket is a readable, writable, controllable and closable file descriptor (integer number)
// Function prototype
int socket(int domain, int type, int protocol)
//Parameter interpretation
domain: Specifies the protocol used by the system. Can be TCP/IP Protocol family, or UNIX Protocol family. The corresponding values are ...
Added by mullz on Sat, 25 Dec 2021 19:33:33 +0200
Basic routing policy configuration of routing Foundation
Basic routing policy configuration
Principle overview:
Route policy is widely used. For example, it can specify that the router only publishes some routes that meet specific conditions when publishing routes, only receives some routes that 1 meet specific conditions when receiving routes, only introduces some routes that meet specific co ...
Added by phencesgirl on Sat, 25 Dec 2021 14:16:45 +0200
BGP advanced features overview (Huawei DataCome)
Routing control
BGP route control includes controlling the release and reception of routes.
BGP routing control is generally realized through routing policy, that is, specific routes are matched through the routing matching tool, and the release and reception of routes are controlled through the routing policy tool
Route matching tools: ACL ...
Added by knighthawk1337 on Sat, 25 Dec 2021 08:39:26 +0200
Part of the first "Hecheng Cup" Henan Hebi CTF network security challenge
The first "Hecheng Cup" Henan Hebi CTF network security challenge
Official account: Th0r security
1
$ tshark -r timu.pcapng http|grep ' GET ' > timu-get
$ for i in `seq 1 30`; do a=`grep "),$i,1)" timu-get|tail -1|cut -d= -f3|cut -
d- -f1`;b=`printf "%x" $a`;echo -n $b; done
666c61677b77317265736841524b5f657a5f31736e74697 ...
Added by chadu on Sat, 25 Dec 2021 04:47:16 +0200