Notes of "deep learning practice of Web security": Chapter 8 harassment message recognition
This chapter mainly takes SMS Spam Collection data set as an example to introduce the identification technology of harassing SMS. This paper introduces the feature extraction methods used to identify harassing short messages, including word bag and TF-IDF model, vocabulary model, Word2Vec and Doc2Vec model, and introduces the models used and th ...
Posted by neo926 on Thu, 10 Mar 2022 12:44:26 +0100
Process protection under r0
preface
The full name of SSDT is System Services Descriptor Table. This table is a link between the Win32 API of Ring3 and the kernel API of Ring0. SSDT not only contains a huge address index table, but also contains some other useful information, such as the base address of the address index, the number of service functions and so on. By modi ...
Posted by ThermalSloth on Mon, 07 Mar 2022 09:45:51 +0100
netcat and shell rebound test
What is a rebound shell?
The reverse shell is that the control end listens to a TCP/UDP port, the controlled end initiates a request to the port, and transfers the input and output of its command line to the control end. The reverse shell corresponds to standard shells such as telnet and ssh. In essence, it is the role reversal of the client a ...
Posted by B34ST on Thu, 03 Mar 2022 19:00:22 +0100
Penetration test exercise No.45 HackMyVm Worrosion3
Target information
Download address:
https://hackmyvm.eu/machines/machine.php?vm=Corrosion3
Range: hackmyvm eu
Target name: Worrosion3
Difficulty: simple
Release time: February 18, 2022
Prompt:
nothing
Target: 2 flag s
Experimental environment
Attack aircraft:VMware kali 192.168.7.3
Target plane:Vbox linux IP Automatic acquisit ...
Posted by Fluoresce on Tue, 01 Mar 2022 13:43:05 +0100
[file upload vulnerability 04] server MIME detection and bypass experiment (based on upload-labs-2 shooting range)
1 MIME overview
1.1 general
Definition: MIME (Multipurpose Internet Mail Extensions) is a Multipurpose Internet mail extension type. It is an Intel standard that describes the content type of messages. MIME messages can contain text, images, audio, video and other application specific data.Meaning: the original purpose of MIME design is t ...
Posted by tomdude48 on Tue, 01 Mar 2022 10:52:12 +0100
hgame web week1 week2 wp ththaiai
web week1
Fujiwara Tofu Shop
See qiumingshan Net to try Referer directly
Hachi roku guessed
What raspberry cookie is a bit of a pit father
Cookies are cookies, but direct setting is wrong. There is no key value. If you see a set cookie in response, just use that key; The same is true for gasoline. Finally, payload is as follows:
Spider.. ...
Posted by tycragg on Sun, 20 Feb 2022 12:23:01 +0100
CTF [network security laboratory] [basic level]
Basic pass
1. Where is the key?
F12 view source code
2. Encrypt again and you will get the key
The encrypted data is xrlvf23xfqwsxsqf
We can encrypt it once.
ROT13 online decoding tool
3. Guess how many times it has been encrypted?
Encrypted string:
Vm0wd2QyUXlVWGxWV0d4V1YwZDRWMVl3WkRSV01WbDNXa1JTVjAxV2JETlhhMUpUVmpBeFYyS
kVUbGhoTVVw ...
Posted by madcrazy1 on Sat, 19 Feb 2022 14:46:26 +0100
Exploration of JNDI vulnerability utilization
Recently, I have learned some JNDI vulnerability utilization chains that master is looking for, and I have benefited a lot. I also try to do some mining on JNDI vulnerability utilization. At present, I think of two questions in the process of JNDI utilization.
It is inconvenient to test that every JNDI Bypass chain needs to change the URL manu ...
Posted by eyaly on Sat, 19 Feb 2022 12:56:24 +0100
Python script guessing website database administrator password
Author home page: San Francisco wyx "Author profile": CSDN top200, Alibaba cloud blog experts, Huawei cloud sharing experts, and high-quality creators in the field of network security
1, Functional analysis
A brief analysis of the functions of the website is as follows: The user is required to submit parameters in the address ...
Posted by aron on Thu, 17 Feb 2022 02:26:44 +0100
2021 national college student information security competition WP (CISCN)
summary
as a trainee who has studied for less than a year, I took part in the national competition for the first time this year. I thought the title would be gentle, but I only made one pwn question in the end. Originally, there were two pwn questions, but I still lacked some knowledge or skills. I didn't do it, and then it was over ...
Posted by rupam_jaiswal on Wed, 09 Feb 2022 21:10:27 +0100