JAVA command execution learning notes
preface
Today, let's learn about command execution in Java. Command execution is still widely used in the field of security. You have to understand and study it. If you forget some knowledge points used below, you can go to the previous article JAVA RMI learning notes ***
About exec
The Runtime class, as its name implies, is the Runtime ...
Added by mark bowen on Fri, 10 Dec 2021 19:04:00 +0200
DVWA level 1: brute force
catalogue
Low
Medium
High
Impossible
Brute force cracking: an attack that attempts to obtain a user's password by using a large number of guesses and exhaustive methods. Just guess the password. The attacker keeps enumerating requests. By comparing the length of the data packet, you can well judge whether the blasting is successful or not ...
Added by kael.shipman on Sun, 05 Dec 2021 18:27:05 +0200
2021SC@SDUSC openssl hash table
2021SC@SDUSC 4 hash table
man lhash
4.1 hash table
In general data structures such as linear tables and trees, there is no definite relationship between the relative position of records in the structure and the keywords of records, A series of keyword comparisons are needed to find records in the structure This kind of search method is based ...
Added by eheia on Sun, 05 Dec 2021 02:56:13 +0200
[ctfshow internal competition] web wp
Sign in
F12 with register.php
import requests
import re
url1 = "http://7fc1279d-6a4b-4fca-968f-235322686f5b.challenge.ctf.show/register.php"
url2 = "http://7fc1279d-6a4b-4fca-968f-235322686f5b.challenge.ctf.show/login.php"
flag = ''
for i in range(1, 50):
payload = "hex(hex(substr((select/**/flag/**/from/**/flag)from/**/" + str(i) + "/** ...
Added by demophoon88 on Fri, 03 Dec 2021 07:16:22 +0200
Red team penetration notes: the front-end language basis of red team
Understanding the front-end language can help us better understand and tap the front-end vulnerabilities. In the process of social work, we can also use the front-end technology to build puddle attacks or fishing attacks.
The design idea of front-end page usually divides the page into three levels: structure layer (HTML), presentation laye ...
Added by mndwn on Thu, 02 Dec 2021 02:09:34 +0200
1_shiro introduction and Practice
1. Authentication and Authorization of Rights Management
Privilege management includes two parts: user identity authentication and authorization, referred to as authentication authorization. Users of resources requiring access control are first authenticated, after which they have access to the resource.
1.1 What is authentication
Identity ...
Added by dirkdetken on Wed, 01 Dec 2021 01:06:28 +0200
On the exploitation of Phar deserialization vulnerability: N1CTF 2021 easyphp & an Xun cup 2021 EZ_TP
Phar
What is Phar
PHp ARchive, like a Java JAR, but for PHP.
Phar (PHp ARchive) is a packaged file similar to JAR. PHP ≥ 5.3 supports phar suffix files by default. You can use it without any other installation.
The phar extension provides a way to put an entire PHP application into a. Phar file for easy movement and installation The bigge ...
Added by phpjaco on Sun, 28 Nov 2021 08:12:23 +0200
Programming language producer consumer model and simple implementation of Golang
Programming language producer consumer model and simple implementation of Golang
Introduction: This paper introduces the producer consumer model and the demo of the simple implementation of go.
1, Producer consumer Model
Producer consumer model: a module (function, etc.) is responsible for generating data, which is processed by another modul ...
Added by homerjsimpson on Thu, 25 Nov 2021 05:34:32 +0200
Programming language Python Jieba Thesaurus
Programming language Python Jieba Thesaurus
jieba database is an excellent third-party database for Chinese word segmentation. Chinese text needs to obtain a single word through word segmentation
jieba library installation
Run the cmd window as an administrator and enter the command: pip install jieba
jieba library function introductio ...
Added by ddoc on Thu, 25 Nov 2021 03:36:28 +0200
Usage of AES encryption in OpenSSL
1 Introduction to AES algorithm
Original link: https://blog.csdn.net/mao834099514/article/details/54945776
1.1 introduction to AES algorithm
Advanced Encryption Standard (AES) in cryptography, also known as Rijndael encryption method, is a block encryption standard adopted by the federal government of the United States. This standard is ...
Added by Glen on Sat, 13 Nov 2021 05:01:16 +0200