Yunxin classroom | how to realize audio and video security detection?
The pan entertainment audio and video chat scene is full of uncontrollable risk factors, such as pornography, violent fear and political information. With the increasingly strict national supervision, each platform needs to control the audio and video content of the platform, and it needs to invest a lot of manpower to process the audio and vid ...
Added by anfo on Sat, 22 Jan 2022 01:58:03 +0200
VulnHub-GoldenEye-1 learning notes
Target address: https://www.vulnhub.com/entry/goldeneye-1,240/
Goal: get root & find flag txt
Author: ned Hogg 007
Time: July 7, 2021
1, Information collection
Open kali virtual machine and target machine Golden Eye-v1, and both virtual machine networks are in NAT mode
kali, check the local IP segment. Mine is 192.168.21.0/24
nma ...
Added by rline101 on Sat, 22 Jan 2022 01:39:19 +0200
Falco security project extension output and custom rules
Falco extended output and custom rules
Summary of Falco and Falcosidekick output types
By default, Falco's events have five outputs: stdout, file, GRPC, shell, and http. As shown in the figure below:
Even if they are convenient, we may soon be limited to integrating Falco with other components. falcosidekick can help. This is a small d ...
Added by kachurak on Fri, 21 Jan 2022 16:01:16 +0200
[JavaWeb] struts 2-001 vulnerability analysis
Python wechat ordering applet course video
https://edu.csdn.net/course/detail/36074
Python practical quantitative transaction financial management system
https://edu.csdn.net/course/detail/35475
Strut2-001
Vulnerability description
When the framework parses the JSP page tag, it will obtain the Value value entered by the user. In obtaining ...
Added by rawky on Sun, 16 Jan 2022 18:44:25 +0200
Android reverse - actual combat so analysis - a continent_ v3.5.8_unidbg learning
1. Introduction to unidbg
unidbg is a reverse tool based on unicorn to simulate the execution of binary programs. It allows security researchers to run android or ios dynamic library files directly on PC and call their methods to see the functions supported by the tool. The supported functions are as follows:
Supports simulated execution ...
Added by always_confused on Sat, 15 Jan 2022 23:00:00 +0200
A security vulnerability analysis
Vulnerability analysis
The environment is built with vulhub. The version is
Confluence Server 6.10.2
Widget Connector is a plug-in of Confluence. Compare the plug-ins before and after repair
Left Confluence 6.13.0 right 6.13.3
widgetconnector-3.1.0.jar!\com\atlassian\confluence\extra\widgetconnector\WidgetMacro.class
You can see that th ...
Added by romeo on Sat, 15 Jan 2022 02:27:52 +0200
js basics ajax and cors
1.DOM
DOM is the interface for JavaScript to operate web pages, and its full name is "Document Object Model". Its function is to turn the web page into a JavaScript object, so that you can use scripts for various operations (such as adding and deleting content).
node
The smallest component of DOM is called node. The tree structure ...
Added by cqinzx on Fri, 14 Jan 2022 17:19:05 +0200
Unidbg + web = unidbg server will teach you how to build a signature server
1, Target
Burst the liver + stay up late, and finally run so with unidbg. You can't put it in the hard disk and get moldy. We have to use it in a generation environment.
The most convenient way is to rent a cloud server and deploy Unidbg to provide cloud signature services for our worker programs.
unidbgUnidbg-server
2, Steps
Unidbg-server ...
Added by cyh123 on Fri, 14 Jan 2022 11:40:45 +0200
File upload (11-19)
Today, I saw the source code of the shooting range uploaded by the file, all of which have flag files
Looks like I lost a billion
Simply put the source code on the small skin of the virtual machine (because the machine has a mysql environment, it is not willing to delete, but also useful)
A new station was established with the help o ...
Added by celavi on Thu, 13 Jan 2022 15:59:23 +0200
Spring security series learning: Password Authentication
Copyright notice: This article is compiled by the team of Digital China cloud base. If you reprint it, please indicate the source.
Evolution of password storage security
In this section, we still accumulate some knowledge and can't wait for the little partners who want to code to bear it again and lay a good foundation to avoid some pits step ...
Added by h123z on Wed, 12 Jan 2022 05:58:46 +0200