Wargames customs clearance notes - Bandit
Range link: https://overthewire.org/wargames/ In the process, most of them will not directly appear the customs clearance password, which may be attached at the end of the text
ssh bandit0@bandit.labs.overthewire.org -p 2220
Then enter the password according to the prompt and log in successfully
cat readme
You can get the next lev ...
Added by Iceman512 on Tue, 08 Feb 2022 17:18:16 +0200
Relearn spring cloud series 8 - microservice gateway security authentication - JWT
Gateway JWT authentication process
1, Authentication process of gateway authentication document
At present, the mainstream process of developing user authentication and service access authentication combined with microservice gateway and JWT token is as follows:
User authentication process: the user sends a login authentication reques ...
Added by marinedalek on Tue, 08 Feb 2022 10:08:18 +0200
Overview of RSTP and MSTP protocols
Detailed knowledge of STP can be used to check the official account and to view the past articles. This paper mainly introduces the concepts of RSTP and MSTP, as well as the configuration examples of MSTP.
1, RSTP
RSTP (fast spanning tree protocol) is developed from STP, which is consistent with the basic idea of STP. It has all the fun ...
Added by GrecoClub on Tue, 08 Feb 2022 07:32:33 +0200
Thread safe List
we all know that ArrayList is non thread safe. When multithreading development, if multiple threads operate on the same ArrayList, a ConcurrentModificationException error will be reported. At this time, we need a thread safe List set. I encountered such problems in the development process. A thread safe List collection is re ...
Added by jack_wetson on Tue, 08 Feb 2022 06:17:39 +0200
File upload learning notes
title: file upload learning notes date: 2021-5-22 tags: penetration test, file upload, basic categories:
Penetration test File upload Basics
File upload learning notes
2021 / 3 / 6 notes
What is a sentence
In one sentence, Trojan horse "server" (locally stored script Trojan horse file)
It is the execution permission we want to u ...
Added by waygood on Tue, 08 Feb 2022 05:31:45 +0200
Code audit learning XSS
definition
Cross site scripting attack is not confused with css, so cross site scripting attack is abbreviated as XSS. XSS is a security vulnerability of Web application, which is mainly caused by insufficient filtering of user input by Web application. The malicious attacker inserts the malicious script code into the Web page. When the user b ...
Added by whizzykid on Sat, 05 Feb 2022 04:12:52 +0200
Soap injection learning -- anluan shooting range -- SOAP Protocol injection practice record
Happy New Year!
Today is the second day of the new year. I wish you all greater progress in the new year.
catalogue
SOAP injection knowledge points
process
SOAP injection knowledge points
SOAP injection - Zhihu
👆👆👆👆👆👆👆👆👆👆👆👆 For details, you can see the explanation of the controller college above (not advertising).
Of c ...
Added by xenophobia on Thu, 03 Feb 2022 07:35:45 +0200
Microservice architecture | 7.2 building OAuth2 security authentication using JWT token storage
preface
<Spring Microservices in Action> Principle and practice of Spring Cloud Alibaba microservice "Spring cloud framework development tutorial in Silicon Valley of station B" Zhou Yang
JWT provides specifications and standards for OAuth2 tokens, and JWT tokens can be customized;
1. Basic knowledge of JWT token stor ...
Added by tomandhannah on Thu, 03 Feb 2022 07:23:06 +0200
Microservice architecture | 7.1 security authentication based on OAuth2
preface
<Spring Microservices in Action> Principle and practice of Spring Cloud Alibaba microservice "Spring cloud framework development tutorial in Silicon Valley of station B" Zhou Yang
OAuth2 is a token based security authentication and authorization framework. It allows users to authenticate using third-party authent ...
Added by Timewell on Wed, 02 Feb 2022 15:27:18 +0200
2021-06-09:DVWA- Brute Force
dvwa- Brute Force
Brute Force, or Brute Force, means that hackers use the password dictionary and use the exhaustive method to guess the user's password.
low level
View source code: Path: phpstudy_pro\WWW\DVWA-master\vulnerabilities\brute\source\low.php
isset( $_GET[ 'Login' ] ) ) {
// Get username
$user = $_GET[ 'username' ];
// Get ...
Added by timetomove on Wed, 02 Feb 2022 11:05:13 +0200