Use Kotlin and CameraX to take photos without feeling on the desktop and screen (with source code)
Android uses Kotlin and CameraX to take photos without feeling on the desktop and screen (with source code)
Requirements: realize a silent photographing without displaying the interface, and can also switch the front and rear cameras and take photos through the volume keys in the rest screen state. After the photos are successfully saved, ther ...
Added by parms on Sat, 19 Feb 2022 16:17:13 +0200
How to prevent SQL injection?
Referring to owasp, this paper focuses on providing clear, simple and operable guidance to prevent SQL injection vulnerabilities in applications. Unfortunately, SQL injection attacks are common due to two factors:
Significant prevalence of SQL injection vulnerabilities The attractiveness of the target (i.e. the database usually contains all ...
Added by Eiolon on Fri, 18 Feb 2022 19:48:38 +0200
File upload vulnerability -- replay of upload labs shooting range (off 8-17)
Download range link
Related principles ① $DATA bypass:
php under windows system, if the file name + ":: $DATA"
The DATA after:: $DATA will be treated as a file stream, the suffix will not be detected, and the file name before:: $DATA will be retained In this way, the purpose of bypassing suffix detection can be achieved Level 9 Sou ...
Added by sasito on Fri, 18 Feb 2022 13:02:20 +0200
Understand iptables in one article
preface
netfilter/iptables (iptables for short) constitute the packet filtering firewall under Linux platform
The iptables component is a tool, also known as user space, that makes it easy to insert, modify, and remove rules from the packet filter table
netfilter component, also known as kernel space, is a part of the kernel. It is composed ...
Added by Tensing on Thu, 17 Feb 2022 17:31:16 +0200
Simple domain penetration
Refer to the connection of master
Intranet penetration - complete domain penetration
Some basic knowledge
Domain:
A computer domain is a collection of computers with security boundaries. Computers in the same domain have established a trust relationship with each other. Accessing other machines in the domain no longer requires the permi ...
Added by jkohns on Sat, 12 Feb 2022 07:32:03 +0200
Understand ARP deception
preface
Learning ARP deception
ARP spoofing is also a very old penetration method, which mainly plays the role of information collection. For example, you can use spoofing to obtain each other's traffic, and analyze the information you think is important from the traffic, such as XX account password. Or use ARP attack to cut off the network a ...
Added by The Phoenix on Fri, 11 Feb 2022 18:35:59 +0200
[penetration test] Vulnstack red team
Domain environment initialization
DC
IP: 10.10.10.10 OS: Windows 2012(64)
Application: AD field
WEB
IP1: 10.10.10.80 IP2: 192.168.111.80 OS: Windows 2008(64)
Application: Weblogic 10.3.6 MSSQL 2008
PC
IP1: 10.10.10.201 IP2: 192.168.111.201 OS: Windows 7(32)
Application:
Attack aircraft
IP: 192.168.111.5 OS: Kali
weblogic exploit
nm ...
Added by alasxdair on Fri, 11 Feb 2022 12:40:12 +0200
H3C SSH Remote Management login configuration
1, Introduction to SSH
SSH is the abbreviation of Secure Shell. SSH is a security protocol based on the application layer. SSH is a reliable protocol designed to provide security for remote login sessions and other network services. Using SSH protocol can effectively prevent information disclosure in the process of remote management. SSH was o ...
Added by hanhao on Thu, 10 Feb 2022 05:00:55 +0200
Moher College - SQL injection vulnerability test (Boolean blind injection)
SQL injection vulnerability test (Boolean blind injection)
The first step is to judge the injection point: Enter a single quotation mark in the url and an error is found. Then enter and1=1. The page is normal and and1=2 reports an error This indicates that there is a SQL injection vulnerability in this url
http://219.153.49.228:48551/new_list ...
Added by andy2006 on Wed, 09 Feb 2022 05:48:07 +0200
Security - Code Execution Vulnerability recurrence of Fastjson version 1.2.24 or less (vulhub)
preface
Skip the installation of the environment. Please Baidu yourself for the installation of the environment This article is only for learning records. Please do not use it for illegal purposes The contents in brackets are variable values and need to be modified according to the actual situation
Fastjson 1.2.24 Download
Java comm ...
Added by machina3k on Tue, 08 Feb 2022 21:31:00 +0200