golang practice - digital signature and authentication

I Digital signature Imagine a scenario: Alice sends Bob a message (I'll invite you to dinner tomorrow). The message is encrypted with Bob's public key (public key encryption can ensure that only Bob can decrypt the message with his own private key after it is intercepted). However, since Bob's public key can be owned by others, Tom can also en ...

Added by ann on Sun, 09 Jan 2022 09:00:48 +0200

Common network security terminology

1. Black hat A person who hacks for illegal purposes, usually for economic gain. They enter the secure network to destroy, redeem, modify or steal data, or make the network unavailable to authorized users. The name comes from the fact that villains in old-fashioned black-and-white western films are easy to be recognized by film viewers because ...

Added by GiaTuan on Sun, 09 Jan 2022 03:36:27 +0200

Huxiang cup 2021 Pastebin recurrence learning

Huxiang cup 2021 Pastebin recurrence learning 1, Introduction to Service Worker Service Worker can be understood as a proxy server between the client and the server. When a Service Worker is registered in the website, it can intercept the request and judge whether to send the request to the server or directly return it to the client through t ...

Added by ashutosh.titan on Wed, 05 Jan 2022 16:08:44 +0200

Use memccpy function to replace unsafe and inefficient str[n]cpy, str[n]cat, etc

The memccpy function can replace the unsafe and inefficient str[n]cpy, str[n]cat, etc The memccpy function is in the POSIX standard library and recently added to the C23 standard library. In the C runtime of MSVC, it starts with an underscore_ Memccpy exists. Functions that do not begin with an underscore are currently deprecated (these functi ...

Added by jokeruk on Tue, 04 Jan 2022 18:44:48 +0200

Penetration testing ideas - tools

Penetration test idea Another: Shadow (mainly record some small processes and experiences of daily penetration) Tools preface If a worker wants to do well, he must sharpen his tools first A good tool can save a lot of time, so a tool set can quickly complete penetration testing Real IP Nslookup Own tools When nslookup obtains more t ...

Added by Tekron-X on Tue, 04 Jan 2022 13:47:29 +0200

Stack overflow attack experiment

Based on seedubuntu16 04 buffer overflow attack experiment I Turn off defense measures 1. Turn off address randomization Input the following command at the terminal to turn off address randomization and simplify the experiment sudo sysctl -w kernel.randomize_va_space=0 [the external chain picture transfer fails. The source station may h ...

Added by vegnadragon on Tue, 04 Jan 2022 11:24:44 +0200

SpringSecurity Filter CsrfFilter

CSRF (Cross-site request forgery), Chinese name: Cross-site request forgery, also known as one click attack/session riding, abbreviated as CSRF/XSRF. You can understand CSRF attacks as follows: an attacker steals your identity and sends malicious requests on your behalf. CSRF can do things like send mail on your behalf, send messages, steal yo ...

Added by BinaryDragon on Mon, 03 Jan 2022 22:17:47 +0200

JavaSSM spring security framework

SpringSecurity In this chapter, we will explain the spring security framework and write the library management system from scratch. Spring security is a very powerful permission verification framework developed based on spring. Its core functions include: Authentication (user login)Authorization (what can this user do)Attack protection (ag ...

Added by searain on Mon, 03 Jan 2022 06:44:09 +0200

Vulnhub customs clearance manual - 04 Five86-1

Vulnhub customs clearance manual - 04 Five86-1 Background overview: The download address is: https://www.vulnhub.com/entry/dc-1-1,292/ The target IP is 100.10 10.133, add the IP address to the hosts file and map it to the domain name five86 local Technical points: opennetadmin exploitfind / -type f -user username view the files that ...

Added by Loldongs on Sun, 02 Jan 2022 19:48:36 +0200

Kali system & scanning and packet capture & service security | Cloud computing

1. Scanning and packet capturing analysis 1.1 problems This case requires to be familiar with common security tools in Linux host environment and complete the following tasks: Use nmap scan to obtain information about the specified host / network segmentScript scanning using nmapAnalysis of plaintext exchange information in FTP access ...

Added by MrQcue on Sun, 02 Jan 2022 12:44:08 +0200