Wargames customs clearance notes - Bandit

Range link: https://overthewire.org/wargames/ In the process, most of them will not directly appear the customs clearance password, which may be attached at the end of the text ssh bandit0@bandit.labs.overthewire.org -p 2220 Then enter the password according to the prompt and log in successfully cat readme You can get the next lev ...

Added by Iceman512 on Tue, 08 Feb 2022 17:18:16 +0200

Relearn spring cloud series 8 - microservice gateway security authentication - JWT

Gateway JWT authentication process 1, Authentication process of gateway authentication document At present, the mainstream process of developing user authentication and service access authentication combined with microservice gateway and JWT token is as follows: User authentication process: the user sends a login authentication reques ...

Added by marinedalek on Tue, 08 Feb 2022 10:08:18 +0200

Overview of RSTP and MSTP protocols

Detailed knowledge of STP can be used to check the official account and to view the past articles. This paper mainly introduces the concepts of RSTP and MSTP, as well as the configuration examples of MSTP.   1, RSTP   RSTP (fast spanning tree protocol) is developed from STP, which is consistent with the basic idea of STP. It has all the fun ...

Added by GrecoClub on Tue, 08 Feb 2022 07:32:33 +0200

Thread safe List

   we all know that ArrayList is non thread safe. When multithreading development, if multiple threads operate on the same ArrayList, a ConcurrentModificationException error will be reported. At this time, we need a thread safe List set.   I encountered such problems in the development process. A thread safe List collection is re ...

Added by jack_wetson on Tue, 08 Feb 2022 06:17:39 +0200

File upload learning notes

title: file upload learning notes date: 2021-5-22 tags: penetration test, file upload, basic categories: Penetration test File upload Basics File upload learning notes 2021 / 3 / 6 notes What is a sentence In one sentence, Trojan horse "server" (locally stored script Trojan horse file) It is the execution permission we want to u ...

Added by waygood on Tue, 08 Feb 2022 05:31:45 +0200

Code audit learning XSS

definition Cross site scripting attack is not confused with css, so cross site scripting attack is abbreviated as XSS. XSS is a security vulnerability of Web application, which is mainly caused by insufficient filtering of user input by Web application. The malicious attacker inserts the malicious script code into the Web page. When the user b ...

Added by whizzykid on Sat, 05 Feb 2022 04:12:52 +0200

Soap injection learning -- anluan shooting range -- SOAP Protocol injection practice record

Happy New Year! Today is the second day of the new year. I wish you all greater progress in the new year. catalogue SOAP injection knowledge points process   SOAP injection knowledge points SOAP injection - Zhihu 👆👆👆👆👆👆👆👆👆👆👆👆 For details, you can see the explanation of the controller college above (not advertising). Of c ...

Added by xenophobia on Thu, 03 Feb 2022 07:35:45 +0200

Microservice architecture | 7.2 building OAuth2 security authentication using JWT token storage

preface <Spring Microservices in Action> Principle and practice of Spring Cloud Alibaba microservice "Spring cloud framework development tutorial in Silicon Valley of station B" Zhou Yang JWT provides specifications and standards for OAuth2 tokens, and JWT tokens can be customized; 1. Basic knowledge of JWT token stor ...

Added by tomandhannah on Thu, 03 Feb 2022 07:23:06 +0200

Microservice architecture | 7.1 security authentication based on OAuth2

preface <Spring Microservices in Action> Principle and practice of Spring Cloud Alibaba microservice "Spring cloud framework development tutorial in Silicon Valley of station B" Zhou Yang OAuth2 is a token based security authentication and authorization framework. It allows users to authenticate using third-party authent ...

Added by Timewell on Wed, 02 Feb 2022 15:27:18 +0200

2021-06-09:DVWA- Brute Force

dvwa- Brute Force Brute Force, or Brute Force, means that hackers use the password dictionary and use the exhaustive method to guess the user's password. low level View source code: Path: phpstudy_pro\WWW\DVWA-master\vulnerabilities\brute\source\low.php isset( $_GET[ 'Login' ] ) ) { // Get username $user = $_GET[ 'username' ]; // Get ...

Added by timetomove on Wed, 02 Feb 2022 11:05:13 +0200