JAVA command execution learning notes

preface Today, let's learn about command execution in Java. Command execution is still widely used in the field of security. You have to understand and study it. If you forget some knowledge points used below, you can go to the previous article JAVA RMI learning notes *** About exec The Runtime class, as its name implies, is the Runtime ...

Added by mark bowen on Fri, 10 Dec 2021 19:04:00 +0200

DVWA level 1: brute force

catalogue Low Medium High Impossible Brute force cracking: an attack that attempts to obtain a user's password by using a large number of guesses and exhaustive methods. Just guess the password. The attacker keeps enumerating requests. By comparing the length of the data packet, you can well judge whether the blasting is successful or not ...

Added by kael.shipman on Sun, 05 Dec 2021 18:27:05 +0200

2021SC@SDUSC openssl hash table

2021SC@SDUSC 4 hash table man lhash 4.1 hash table In general data structures such as linear tables and trees, there is no definite relationship between the relative position of records in the structure and the keywords of records, A series of keyword comparisons are needed to find records in the structure This kind of search method is based ...

Added by eheia on Sun, 05 Dec 2021 02:56:13 +0200

[ctfshow internal competition] web wp

Sign in F12 with register.php import requests import re url1 = "http://7fc1279d-6a4b-4fca-968f-235322686f5b.challenge.ctf.show/register.php" url2 = "http://7fc1279d-6a4b-4fca-968f-235322686f5b.challenge.ctf.show/login.php" flag = '' for i in range(1, 50): payload = "hex(hex(substr((select/**/flag/**/from/**/flag)from/**/" + str(i) + "/** ...

Added by demophoon88 on Fri, 03 Dec 2021 07:16:22 +0200

Red team penetration notes: the front-end language basis of red team

Understanding the front-end language can help us better understand and tap the front-end vulnerabilities. In the process of social work, we can also use the front-end technology to build puddle attacks or fishing attacks. The design idea of front-end page usually divides the page into three levels: structure layer (HTML), presentation laye ...

Added by mndwn on Thu, 02 Dec 2021 02:09:34 +0200

1_shiro introduction and Practice

1. Authentication and Authorization of Rights Management Privilege management includes two parts: user identity authentication and authorization, referred to as authentication authorization. Users of resources requiring access control are first authenticated, after which they have access to the resource. 1.1 What is authentication Identity ...

Added by dirkdetken on Wed, 01 Dec 2021 01:06:28 +0200

On the exploitation of Phar deserialization vulnerability: N1CTF 2021 easyphp & an Xun cup 2021 EZ_TP

Phar What is Phar PHp ARchive, like a Java JAR, but for PHP. Phar (PHp ARchive) is a packaged file similar to JAR. PHP ≥ 5.3 supports phar suffix files by default. You can use it without any other installation. The phar extension provides a way to put an entire PHP application into a. Phar file for easy movement and installation The bigge ...

Added by phpjaco on Sun, 28 Nov 2021 08:12:23 +0200

Programming language producer consumer model and simple implementation of Golang

Programming language producer consumer model and simple implementation of Golang Introduction: This paper introduces the producer consumer model and the demo of the simple implementation of go. 1, Producer consumer Model Producer consumer model: a module (function, etc.) is responsible for generating data, which is processed by another modul ...

Added by homerjsimpson on Thu, 25 Nov 2021 05:34:32 +0200

Programming language Python Jieba Thesaurus

Programming language Python Jieba Thesaurus jieba database is an excellent third-party database for Chinese word segmentation. Chinese text needs to obtain a single word through word segmentation jieba library installation Run the cmd window as an administrator and enter the command: pip install jieba jieba library function introductio ...

Added by ddoc on Thu, 25 Nov 2021 03:36:28 +0200

Usage of AES encryption in OpenSSL

1 Introduction to AES algorithm Original link: https://blog.csdn.net/mao834099514/article/details/54945776 1.1 introduction to AES algorithm Advanced Encryption Standard (AES) in cryptography, also known as Rijndael encryption method, is a block encryption standard adopted by the federal government of the United States. This standard is ...

Added by Glen on Sat, 13 Nov 2021 05:01:16 +0200