Sent a packet to xxxhub and found some hidden secrets

Hello, I'm Jay Chou.That day, I suddenly thought of a question:When I visit the GitHub that fascinates thousands of otaku programmers, how does the data packet sent by my computer reach the GitHub server on the other side of the ocean, and what nodes do I pass through?Let's explore this problem together. Please fasten your seat belt. The comput ...

Posted by ciaran on Fri, 07 Jan 2022 09:23:28 +0100

K8s common command collection

The purpose of this article is to record the CLI command set commonly used in the use of K8s. The following is a brief classification of the related commands for different operations of various resource objects in K8s cluster. 1. Create resources Generally, there are two ways to create resources: through files or commands. # Create a Deploym ...

Posted by [e]r!k on Wed, 05 Jan 2022 07:21:02 +0100

SQL injection vulnerability shooting range - sqli labs learning

less-1 Judge injection point Add in the url according to the prompt? id=1 - note that all the symbols entered here are in English Of course 2, it's OK. It's just to pass a parameter and output a login result After we know the successful landing page, we should now try his guess about the closing mode of a piece of code (here are "' ...

Posted by Online Connect on Tue, 04 Jan 2022 02:25:33 +0100

[python implements Hill encryption] the most detailed explanation of hill encryption, with code attached

preface Recently, when I was preparing for the final exam of network security and reviewed Hill encryption, I remembered that the programming homework I had done before was rough, and I didn't understand how to find the decryption key of hill cryptosystem. Today, I figured it out, so I implemented and sorted out the hill cryptosystem. The code ...

Posted by xydra on Tue, 04 Jan 2022 01:03:25 +0100

4W words + thousands of lines of code! Tomcat penetration test method summary, bring it to you!

catalogue preface install Tomcat analysis Main documents Upload directory Tomcat penetration Tomcat arbitrary file write (CVE-2017-12615) Tomcat remote code execution (CVE-2019-0232) Tomcat weak password & background getshell vulnerability Tomcat manager App brute force cracking Tomcat AJP file contains vulnerability analysis (CV ...

Posted by live_ex3me on Mon, 03 Jan 2022 11:34:46 +0100

2 - vulnerability analysis - tomcat AJP protocol file contains vulnerability analysis [CVE-2020-1938]

Vulnerability Description: tomcat is a small and medium-sized Java EE server developed by Apache organization. It implements Java EE specifications such as servlet and JSP, and can provide web resource access services. tomcat mainly provides two communication modes to access web resources: http protocol and AJP protocol. The tomcat server wil ...

Posted by genom on Mon, 03 Jan 2022 09:47:55 +0100

How to prevent sql injection and parameter passing in mybatis

environment mysql is used. The database name is test and contains 1. The table name is users. The data in users is as follows SQL injection under JDBC There are two methods to execute SQL statements under JDBC, namely Statement and PrepareStatement, in which PrepareStatement is precompiled Statement SQL statement SELECT * FROM users W ...

Posted by dropfaith on Sun, 02 Jan 2022 23:24:57 +0100

Basic knowledge suitable for beginners - SSTI vulnerability learning

Introduction to SSTI MVC MVC is a framework mode. Its full name is Model View Controller. That is, model - View - controller Under the guidance of MVC, in the development, a method of separating business logic, data and interface display is used to organize the code, gather the business logic into one component, and get better development a ...

Posted by Jurik on Sun, 02 Jan 2022 15:02:35 +0100

Detailed explanation of Python data type conversion (with detailed cases attached)

Author home page: San Francisco wyx This article has been entered into the column Introduction to Python The latest version of Python Xiaobai tutorial in 2021 is for 0 basic Xiaobai and partners with weak foundation Tip: click the blue "function name" in the list to go directly to the function parsing area Function nameeffectusein ...

Posted by sarahk on Fri, 31 Dec 2021 18:10:23 +0100

How to build centos7 Mini platform step by step and deploy SSH Remote Login

How to build centos7 Mini platform step by step and deploy SSH Remote Login ​ First, you have to download an image of centos7 minimum. I downloaded it on the official website https://www.centos.org/download/ I took an empty U SB flash drive, which is small, so I decided to download centos7 minimum. An assistant for installing USB flash dis ...

Posted by dexhaven on Fri, 31 Dec 2021 06:15:07 +0100