Yunxin classroom | how to realize audio and video security detection?

The pan entertainment audio and video chat scene is full of uncontrollable risk factors, such as pornography, violent fear and political information. With the increasingly strict national supervision, each platform needs to control the audio and video content of the platform, and it needs to invest a lot of manpower to process the audio and vid ...

Added by anfo on Sat, 22 Jan 2022 01:58:03 +0200

VulnHub-GoldenEye-1 learning notes

Target address: https://www.vulnhub.com/entry/goldeneye-1,240/ Goal: get root & find flag txt Author: ned Hogg 007 Time: July 7, 2021 1, Information collection Open kali virtual machine and target machine Golden Eye-v1, and both virtual machine networks are in NAT mode kali, check the local IP segment. Mine is 192.168.21.0/24 nma ...

Added by rline101 on Sat, 22 Jan 2022 01:39:19 +0200

Falco security project extension output and custom rules

Falco extended output and custom rules Summary of Falco and Falcosidekick output types By default, Falco's events have five outputs: stdout, file, GRPC, shell, and http. As shown in the figure below: Even if they are convenient, we may soon be limited to integrating Falco with other components. falcosidekick can help. This is a small d ...

Added by kachurak on Fri, 21 Jan 2022 16:01:16 +0200

[JavaWeb] struts 2-001 vulnerability analysis

Python wechat ordering applet course video https://edu.csdn.net/course/detail/36074 Python practical quantitative transaction financial management system https://edu.csdn.net/course/detail/35475 Strut2-001 Vulnerability description When the framework parses the JSP page tag, it will obtain the Value value entered by the user. In obtaining ...

Added by rawky on Sun, 16 Jan 2022 18:44:25 +0200

Android reverse - actual combat so analysis - a continent_ v3.5.8_unidbg learning

1. Introduction to unidbg unidbg is a reverse tool based on unicorn to simulate the execution of binary programs. It allows security researchers to run android or ios dynamic library files directly on PC and call their methods to see the functions supported by the tool. The supported functions are as follows: Supports simulated execution ...

Added by always_confused on Sat, 15 Jan 2022 23:00:00 +0200

A security vulnerability analysis

Vulnerability analysis The environment is built with vulhub. The version is Confluence Server 6.10.2 Widget Connector is a plug-in of Confluence. Compare the plug-ins before and after repair Left Confluence 6.13.0 right 6.13.3 widgetconnector-3.1.0.jar!\com\atlassian\confluence\extra\widgetconnector\WidgetMacro.class You can see that th ...

Added by romeo on Sat, 15 Jan 2022 02:27:52 +0200

js basics ajax and cors

1.DOM DOM is the interface for JavaScript to operate web pages, and its full name is "Document Object Model". Its function is to turn the web page into a JavaScript object, so that you can use scripts for various operations (such as adding and deleting content). node The smallest component of DOM is called node. The tree structure ...

Added by cqinzx on Fri, 14 Jan 2022 17:19:05 +0200

Unidbg + web = unidbg server will teach you how to build a signature server

1, Target Burst the liver + stay up late, and finally run so with unidbg. You can't put it in the hard disk and get moldy. We have to use it in a generation environment. The most convenient way is to rent a cloud server and deploy Unidbg to provide cloud signature services for our worker programs. unidbgUnidbg-server 2, Steps Unidbg-server ...

Added by cyh123 on Fri, 14 Jan 2022 11:40:45 +0200

File upload (11-19)

Today, I saw the source code of the shooting range uploaded by the file, all of which have flag files Looks like I lost a billion Simply put the source code on the small skin of the virtual machine (because the machine has a mysql environment, it is not willing to delete, but also useful) A new station was established with the help o ...

Added by celavi on Thu, 13 Jan 2022 15:59:23 +0200

Spring security series learning: Password Authentication

Copyright notice: This article is compiled by the team of Digital China cloud base. If you reprint it, please indicate the source. Evolution of password storage security In this section, we still accumulate some knowledge and can't wait for the little partners who want to code to bear it again and lay a good foundation to avoid some pits step ...

Added by h123z on Wed, 12 Jan 2022 05:58:46 +0200