Use Kotlin and CameraX to take photos without feeling on the desktop and screen (with source code)

Android uses Kotlin and CameraX to take photos without feeling on the desktop and screen (with source code) Requirements: realize a silent photographing without displaying the interface, and can also switch the front and rear cameras and take photos through the volume keys in the rest screen state. After the photos are successfully saved, ther ...

Added by parms on Sat, 19 Feb 2022 16:17:13 +0200

How to prevent SQL injection?

Referring to owasp, this paper focuses on providing clear, simple and operable guidance to prevent SQL injection vulnerabilities in applications. Unfortunately, SQL injection attacks are common due to two factors: Significant prevalence of SQL injection vulnerabilities The attractiveness of the target (i.e. the database usually contains all ...

Added by Eiolon on Fri, 18 Feb 2022 19:48:38 +0200

File upload vulnerability -- replay of upload labs shooting range (off 8-17)

Download range link Related principles ① $DATA bypass: php under windows system, if the file name + ":: $DATA" The DATA after:: $DATA will be treated as a file stream, the suffix will not be detected, and the file name before:: $DATA will be retained In this way, the purpose of bypassing suffix detection can be achieved Level 9 Sou ...

Added by sasito on Fri, 18 Feb 2022 13:02:20 +0200

Understand iptables in one article

preface netfilter/iptables (iptables for short) constitute the packet filtering firewall under Linux platform The iptables component is a tool, also known as user space, that makes it easy to insert, modify, and remove rules from the packet filter table netfilter component, also known as kernel space, is a part of the kernel. It is composed ...

Added by Tensing on Thu, 17 Feb 2022 17:31:16 +0200

Simple domain penetration

Refer to the connection of master Intranet penetration - complete domain penetration Some basic knowledge Domain: A computer domain is a collection of computers with security boundaries. Computers in the same domain have established a trust relationship with each other. Accessing other machines in the domain no longer requires the permi ...

Added by jkohns on Sat, 12 Feb 2022 07:32:03 +0200

Understand ARP deception

preface Learning ARP deception ARP spoofing is also a very old penetration method, which mainly plays the role of information collection. For example, you can use spoofing to obtain each other's traffic, and analyze the information you think is important from the traffic, such as XX account password. Or use ARP attack to cut off the network a ...

Added by The Phoenix on Fri, 11 Feb 2022 18:35:59 +0200

[penetration test] Vulnstack red team

Domain environment initialization DC IP: 10.10.10.10 OS: Windows 2012(64) Application: AD field WEB IP1: 10.10.10.80 IP2: 192.168.111.80 OS: Windows 2008(64) Application: Weblogic 10.3.6 MSSQL 2008 PC IP1: 10.10.10.201 IP2: 192.168.111.201 OS: Windows 7(32) Application: Attack aircraft IP: 192.168.111.5 OS: Kali weblogic exploit nm ...

Added by alasxdair on Fri, 11 Feb 2022 12:40:12 +0200

H3C SSH Remote Management login configuration

1, Introduction to SSH SSH is the abbreviation of Secure Shell. SSH is a security protocol based on the application layer. SSH is a reliable protocol designed to provide security for remote login sessions and other network services. Using SSH protocol can effectively prevent information disclosure in the process of remote management. SSH was o ...

Added by hanhao on Thu, 10 Feb 2022 05:00:55 +0200

Moher College - SQL injection vulnerability test (Boolean blind injection)

SQL injection vulnerability test (Boolean blind injection) The first step is to judge the injection point: Enter a single quotation mark in the url and an error is found. Then enter and1=1. The page is normal and and1=2 reports an error This indicates that there is a SQL injection vulnerability in this url http://219.153.49.228:48551/new_list ...

Added by andy2006 on Wed, 09 Feb 2022 05:48:07 +0200

Security - Code Execution Vulnerability recurrence of Fastjson version 1.2.24 or less (vulhub)

preface Skip the installation of the environment. Please Baidu yourself for the installation of the environment This article is only for learning records. Please do not use it for illegal purposes The contents in brackets are variable values and need to be modified according to the actual situation Fastjson 1.2.24 Download Java comm ...

Added by machina3k on Tue, 08 Feb 2022 21:31:00 +0200