Sent a packet to xxxhub and found some hidden secrets
Hello, I'm Jay Chou.That day, I suddenly thought of a question:When I visit the GitHub that fascinates thousands of otaku programmers, how does the data packet sent by my computer reach the GitHub server on the other side of the ocean, and what nodes do I pass through?Let's explore this problem together. Please fasten your seat belt. The comput ...
Posted by ciaran on Fri, 07 Jan 2022 09:23:28 +0100
K8s common command collection
The purpose of this article is to record the CLI command set commonly used in the use of K8s. The following is a brief classification of the related commands for different operations of various resource objects in K8s cluster.
1. Create resources
Generally, there are two ways to create resources: through files or commands.
# Create a Deploym ...
Posted by [e]r!k on Wed, 05 Jan 2022 07:21:02 +0100
SQL injection vulnerability shooting range - sqli labs learning
less-1
Judge injection point
Add in the url according to the prompt? id=1 - note that all the symbols entered here are in English
Of course 2, it's OK. It's just to pass a parameter and output a login result
After we know the successful landing page, we should now try his guess about the closing mode of a piece of code (here are "' ...
Posted by Online Connect on Tue, 04 Jan 2022 02:25:33 +0100
[python implements Hill encryption] the most detailed explanation of hill encryption, with code attached
preface
Recently, when I was preparing for the final exam of network security and reviewed Hill encryption, I remembered that the programming homework I had done before was rough, and I didn't understand how to find the decryption key of hill cryptosystem. Today, I figured it out, so I implemented and sorted out the hill cryptosystem. The code ...
Posted by xydra on Tue, 04 Jan 2022 01:03:25 +0100
4W words + thousands of lines of code! Tomcat penetration test method summary, bring it to you!
catalogue
preface
install
Tomcat analysis
Main documents
Upload directory
Tomcat penetration
Tomcat arbitrary file write (CVE-2017-12615)
Tomcat remote code execution (CVE-2019-0232)
Tomcat weak password & background getshell vulnerability
Tomcat manager App brute force cracking
Tomcat AJP file contains vulnerability analysis (CV ...
Posted by live_ex3me on Mon, 03 Jan 2022 11:34:46 +0100
2 - vulnerability analysis - tomcat AJP protocol file contains vulnerability analysis [CVE-2020-1938]
Vulnerability Description:
tomcat is a small and medium-sized Java EE server developed by Apache organization. It implements Java EE specifications such as servlet and JSP, and can provide web resource access services. tomcat mainly provides two communication modes to access web resources: http protocol and AJP protocol.
The tomcat server wil ...
Posted by genom on Mon, 03 Jan 2022 09:47:55 +0100
How to prevent sql injection and parameter passing in mybatis
environment
mysql is used. The database name is test and contains 1. The table name is users. The data in users is as follows
SQL injection under JDBC
There are two methods to execute SQL statements under JDBC, namely Statement and PrepareStatement, in which PrepareStatement is precompiled
Statement
SQL statement
SELECT * FROM users W ...
Posted by dropfaith on Sun, 02 Jan 2022 23:24:57 +0100
Basic knowledge suitable for beginners - SSTI vulnerability learning
Introduction to SSTI
MVC MVC is a framework mode. Its full name is Model View Controller.
That is, model - View - controller Under the guidance of MVC, in the development, a method of separating business logic, data and interface display is used to organize the code, gather the business logic into one component, and get better development a ...
Posted by Jurik on Sun, 02 Jan 2022 15:02:35 +0100
Detailed explanation of Python data type conversion (with detailed cases attached)
Author home page: San Francisco wyx This article has been entered into the column Introduction to Python The latest version of Python Xiaobai tutorial in 2021 is for 0 basic Xiaobai and partners with weak foundation
Tip: click the blue "function name" in the list to go directly to the function parsing area
Function nameeffectusein ...
Posted by sarahk on Fri, 31 Dec 2021 18:10:23 +0100
How to build centos7 Mini platform step by step and deploy SSH Remote Login
How to build centos7 Mini platform step by step and deploy SSH Remote Login
First, you have to download an image of centos7 minimum. I downloaded it on the official website
https://www.centos.org/download/
I took an empty U SB flash drive, which is small, so I decided to download centos7 minimum.
An assistant for installing USB flash dis ...
Posted by dexhaven on Fri, 31 Dec 2021 06:15:07 +0100