On the development principle of game plug-in -- Taking plant vs zombie memory as an example

preface I'm a little interested in plug-ins and get to know them 1, Game plug-in development principle 1. Plug in classification Plug ins are generally divided into three types: analog keys, WPE packets and memory Simulate the keyboard and mouse. This is called key simulation, also known as script wizardModifying data packets is called WPE ...

Posted by faheemhameed on Wed, 09 Feb 2022 08:34:33 +0100

[PHP] common functions for file upload

preface Collected several common functions in file upload and utilization. An in-depth understanding of these functions should contribute to the smooth upload and utilization of files. Indexes 1. deldot 2. in_array 3. intval 4. strrchr 5. strtolower 6. strrpos 7. str_ireplace 8. strstr 9. substr 10. trim Common functions 1. deld ...

Posted by jd023 on Tue, 25 Jan 2022 11:18:02 +0100

Struts vulnerability collection

Struts vulnerability collection Some Strtus2 vulnerabilities are summarized. Although there are few vulnerabilities in this part, it is also a part of learning. The collection is not comprehensive, and will be supplemented later. The vulnerability environment can be built using the online vulfucus or deployed using docker S2-001 (CVE-2007-45 ...

Posted by TylerL on Mon, 24 Jan 2022 19:31:46 +0100

Record once from blind SSRF to RCE

Gongzong No.: black palm A blogger who focuses on sharing network security, hot spots in the hacker circle and hacker tool technology area! I. Preface The vulnerability bounty program for discovering this vulnerability does not allow public disclosure, so I will not directly use the system name involved. The project is one of the projects t ...

Posted by monkey72 on Fri, 21 Jan 2022 13:55:43 +0100

Republish experiment

catalogue preface​ Experimental requirements experimental analysis preface How to complete the experiment according to the experimental requirements? Experimental requirements 1. Multipoint two-way republication between the two protocols 2. The loopback of R7 is not announced in the OSPF protocol, and is republished later 3. ...

Posted by angeljyt on Thu, 20 Jan 2022 22:20:11 +0100

The engineers next door cried greedily for my reverse engineering IDA and said they would rub my back and pinch my feet

primary coverage According to the monitoring requirements of process behavior, many security software used Hook technology to intercept key system calls to intercept malware process creation. However, under x64 architecture, the system kernel has done a lot of security detection measures, especially technologies like KDP, which makes th ...

Posted by StewardManscat on Thu, 20 Jan 2022 07:20:46 +0100

windows intranet information collection

introduction: After entering the intranet, it is a point-to-line and then face-to-face test. First, find out the current machine situation, such as the role in the domain and the services provided; Then use this as a springboard to collect information from other machines. When enough information is collected, the higher the possibility of winni ...

Posted by inutero on Wed, 19 Jan 2022 12:48:11 +0100

[IDS road] the latest Snort3 and Snort2 installation detailed tutorial

Welcome new students ... ... If you are nameless, you can concentrate on practicing sword I am not a salted fish, but a dead fish! I have seen many installation tutorials of snort3 and snort2 on the Internet, especially the installation of snort3. Bloggers seriously doubt whether they have really installed successfully, People really w ...

Posted by t0ta11 on Wed, 19 Jan 2022 07:08:04 +0100

Cve-2020-0787 full version windows local rights lifting vulnerability recurrence

0x00 introduction In March 2020, Microsoft announced a local privilege raising vulnerability CVE-2020-0787, which can be called the full version of windows. According to Microsoft's vulnerability description, an attacker can use this vulnerability to construct a malicious program after logging in to the system with a low privilege user, and di ...

Posted by rmurdo on Tue, 18 Jan 2022 06:48:27 +0100

Ten thousand word summary of XSS's strongest knowledge system vulnerabilities

I XSSI vulnerability principle Homology strategy Homology policy is the most basic and core policy in Web application security model. Now all browsers that support JavaScript will use this strategy. The so-called homology means that the domain name, protocol and port are the same. The same origin policy stipulates that client scripts (ja ...

Posted by 2gd-2be-2rue on Mon, 17 Jan 2022 16:37:30 +0100