Notes of "deep learning practice of Web security": Chapter 8 harassment message recognition

This chapter mainly takes SMS Spam Collection data set as an example to introduce the identification technology of harassing SMS. This paper introduces the feature extraction methods used to identify harassing short messages, including word bag and TF-IDF model, vocabulary model, Word2Vec and Doc2Vec model, and introduces the models used and th ...

Posted by neo926 on Thu, 10 Mar 2022 12:44:26 +0100

Process protection under r0

preface The full name of SSDT is System Services Descriptor Table. This table is a link between the Win32 API of Ring3 and the kernel API of Ring0. SSDT not only contains a huge address index table, but also contains some other useful information, such as the base address of the address index, the number of service functions and so on. By modi ...

Posted by ThermalSloth on Mon, 07 Mar 2022 09:45:51 +0100

netcat and shell rebound test

What is a rebound shell? The reverse shell is that the control end listens to a TCP/UDP port, the controlled end initiates a request to the port, and transfers the input and output of its command line to the control end. The reverse shell corresponds to standard shells such as telnet and ssh. In essence, it is the role reversal of the client a ...

Posted by B34ST on Thu, 03 Mar 2022 19:00:22 +0100

Penetration test exercise No.45 HackMyVm Worrosion3

Target information Download address: https://hackmyvm.eu/machines/machine.php?vm=Corrosion3 Range: hackmyvm eu Target name: Worrosion3 Difficulty: simple Release time: February 18, 2022 Prompt: nothing Target: 2 flag s Experimental environment Attack aircraft:VMware kali 192.168.7.3 Target plane:Vbox linux IP Automatic acquisit ...

Posted by Fluoresce on Tue, 01 Mar 2022 13:43:05 +0100

[file upload vulnerability 04] server MIME detection and bypass experiment (based on upload-labs-2 shooting range)

1 MIME overview 1.1 general Definition: MIME (Multipurpose Internet Mail Extensions) is a Multipurpose Internet mail extension type. It is an Intel standard that describes the content type of messages. MIME messages can contain text, images, audio, video and other application specific data.Meaning: the original purpose of MIME design is t ...

Posted by tomdude48 on Tue, 01 Mar 2022 10:52:12 +0100

hgame web week1 week2 wp ththaiai

web week1 Fujiwara Tofu Shop See qiumingshan Net to try Referer directly Hachi roku guessed What raspberry cookie is a bit of a pit father Cookies are cookies, but direct setting is wrong. There is no key value. If you see a set cookie in response, just use that key; The same is true for gasoline. Finally, payload is as follows: Spider.. ...

Posted by tycragg on Sun, 20 Feb 2022 12:23:01 +0100

CTF [network security laboratory] [basic level]

Basic pass 1. Where is the key? F12 view source code 2. Encrypt again and you will get the key The encrypted data is xrlvf23xfqwsxsqf We can encrypt it once. ROT13 online decoding tool 3. Guess how many times it has been encrypted? Encrypted string: Vm0wd2QyUXlVWGxWV0d4V1YwZDRWMVl3WkRSV01WbDNXa1JTVjAxV2JETlhhMUpUVmpBeFYyS kVUbGhoTVVw ...

Posted by madcrazy1 on Sat, 19 Feb 2022 14:46:26 +0100

Exploration of JNDI vulnerability utilization

Recently, I have learned some JNDI vulnerability utilization chains that master is looking for, and I have benefited a lot. I also try to do some mining on JNDI vulnerability utilization. At present, I think of two questions in the process of JNDI utilization. It is inconvenient to test that every JNDI Bypass chain needs to change the URL manu ...

Posted by eyaly on Sat, 19 Feb 2022 12:56:24 +0100

Python script guessing website database administrator password

Author home page: San Francisco wyx "Author profile": CSDN top200, Alibaba cloud blog experts, Huawei cloud sharing experts, and high-quality creators in the field of network security 1, Functional analysis A brief analysis of the functions of the website is as follows: The user is required to submit parameters in the address ...

Posted by aron on Thu, 17 Feb 2022 02:26:44 +0100

2021 national college student information security competition WP (CISCN)

summary   as a trainee who has studied for less than a year, I took part in the national competition for the first time this year. I thought the title would be gentle, but I only made one pwn question in the end. Originally, there were two pwn questions, but I still lacked some knowledge or skills. I didn't do it, and then it was over ...

Posted by rupam_jaiswal on Wed, 09 Feb 2022 21:10:27 +0100