On the development principle of game plug-in -- Taking plant vs zombie memory as an example
preface
I'm a little interested in plug-ins and get to know them
1, Game plug-in development principle
1. Plug in classification
Plug ins are generally divided into three types: analog keys, WPE packets and memory
Simulate the keyboard and mouse. This is called key simulation, also known as script wizardModifying data packets is called WPE ...
Posted by faheemhameed on Wed, 09 Feb 2022 08:34:33 +0100
[PHP] common functions for file upload
preface
Collected several common functions in file upload and utilization. An in-depth understanding of these functions should contribute to the smooth upload and utilization of files.
Indexes
1. deldot
2. in_array
3. intval
4. strrchr
5. strtolower
6. strrpos
7. str_ireplace
8. strstr
9. substr
10. trim
Common functions
1. deld ...
Posted by jd023 on Tue, 25 Jan 2022 11:18:02 +0100
Struts vulnerability collection
Struts vulnerability collection
Some Strtus2 vulnerabilities are summarized. Although there are few vulnerabilities in this part, it is also a part of learning. The collection is not comprehensive, and will be supplemented later.
The vulnerability environment can be built using the online vulfucus or deployed using docker
S2-001 (CVE-2007-45 ...
Posted by TylerL on Mon, 24 Jan 2022 19:31:46 +0100
Record once from blind SSRF to RCE
Gongzong No.: black palm A blogger who focuses on sharing network security, hot spots in the hacker circle and hacker tool technology area!
I. Preface
The vulnerability bounty program for discovering this vulnerability does not allow public disclosure, so I will not directly use the system name involved. The project is one of the projects t ...
Posted by monkey72 on Fri, 21 Jan 2022 13:55:43 +0100
Republish experiment
catalogue
preface
Experimental requirements
experimental analysis
preface
How to complete the experiment according to the experimental requirements?
Experimental requirements
1. Multipoint two-way republication between the two protocols
2. The loopback of R7 is not announced in the OSPF protocol, and is republished later
3. ...
Posted by angeljyt on Thu, 20 Jan 2022 22:20:11 +0100
The engineers next door cried greedily for my reverse engineering IDA and said they would rub my back and pinch my feet
primary coverage
According to the monitoring requirements of process behavior, many security software used Hook technology to intercept key system calls to intercept malware process creation. However, under x64 architecture, the system kernel has done a lot of security detection measures, especially technologies like KDP, which makes th ...
Posted by StewardManscat on Thu, 20 Jan 2022 07:20:46 +0100
windows intranet information collection
introduction: After entering the intranet, it is a point-to-line and then face-to-face test. First, find out the current machine situation, such as the role in the domain and the services provided; Then use this as a springboard to collect information from other machines. When enough information is collected, the higher the possibility of winni ...
Posted by inutero on Wed, 19 Jan 2022 12:48:11 +0100
[IDS road] the latest Snort3 and Snort2 installation detailed tutorial
Welcome new students ... ... If you are nameless, you can concentrate on practicing sword
I am not a salted fish, but a dead fish!
I have seen many installation tutorials of snort3 and snort2 on the Internet, especially the installation of snort3. Bloggers seriously doubt whether they have really installed successfully, People really w ...
Posted by t0ta11 on Wed, 19 Jan 2022 07:08:04 +0100
Cve-2020-0787 full version windows local rights lifting vulnerability recurrence
0x00 introduction
In March 2020, Microsoft announced a local privilege raising vulnerability CVE-2020-0787, which can be called the full version of windows. According to Microsoft's vulnerability description, an attacker can use this vulnerability to construct a malicious program after logging in to the system with a low privilege user, and di ...
Posted by rmurdo on Tue, 18 Jan 2022 06:48:27 +0100
Ten thousand word summary of XSS's strongest knowledge system vulnerabilities
I XSSI vulnerability principle
Homology strategy
Homology policy is the most basic and core policy in Web application security model.
Now all browsers that support JavaScript will use this strategy.
The so-called homology means that the domain name, protocol and port are the same.
The same origin policy stipulates that client scripts (ja ...
Posted by 2gd-2be-2rue on Mon, 17 Jan 2022 16:37:30 +0100