SQL injection - wide byte injection (interview hotspot)
Experimental purpose Popularize the principle and application of wide byte injection, as well as the basic methods and processes of wide byte injection.
Experimental environment Attack machine: tell the peach blossom not to open (1) Operating system: Windows10 (2) Installed applications: sqlmap,Burpsuite,FireFox browser plug-in Hackbar, FoxyPr ...
Posted by cravin4candy on Sun, 20 Feb 2022 18:24:22 +0100
Sharding JDBC sub database and sub table case
9 cases
9.1 requirements description
The list of goods on the e-commerce platform is displayed. In addition to the basic information and description information of the goods, each list item also includes the store information to which the goods belong, as follows:
The functions of this case are as follows:
Add itemProduct paging queryC ...
Posted by dibyajyotig on Sun, 20 Feb 2022 15:07:45 +0100
SQL injection -- blind injection based on time
Purpose of this chapter
Popularize the application scenarios and conditions of delayed blind injection technology, be familiar with the usage of functions such as length(), Substr(), ascii(), sleep(), if(), and master the basic process of time-based blind injection.
PS: the interview questions and answers are delayed without deep questions
E ...
Posted by jokkis on Sun, 20 Feb 2022 14:50:47 +0100
Connection query of MySQL learning notes (SQL99 standard) inner, left outer, right outer, full outer, cross, etc
Join query in sql99 syntax
Syntax:
SELECT query list FROM table 1 alias [connection type] JOIN table 2 alias ON connection conditions [WHERE filter criteria] [GROUP BY] [HAVING filter criteria] [ORDER BY sort list]
Connection type:
inner connection: inner External connection: Left outer: left [outer] Right outer: right [outer] full ...
Posted by kampbell411 on Sun, 20 Feb 2022 14:24:25 +0100
MySQL save or update saveOrUpdate
1. Introduction
In the process of project development, when some data is written, if it already exists, it can be overwritten. This can prevent multiple repeated writes to the only key conflict and error reporting. Here are two examples of using saveOrUpdate in MyBatis configuration files
<!-- Single data saving -->
<insert id="saveO ...
Posted by mckooter on Sun, 20 Feb 2022 09:29:36 +0100
Manual compilation of StarRocks-2.0 in ARM environment
1. Background
Since the official version of rockdoc is available in the cloud environment, rockdoc has to be used as the real-time image of the company's own version, but it is not installed in the cloud environment. According to the release of StarRocks official website, ARM environment is supported in version 2.0, so it starts to scratch the ...
Posted by dpsd on Sun, 20 Feb 2022 09:19:05 +0100
Hive installation, deployment and management
Hive installation, deployment and management
Experimental environment
Linux Ubuntu 16.04 prerequisite: 1) Java runtime environment deployment completed 2) Hadoop 3.0.0 single point deployment completed 3) MySQL database installation completed The above preconditions are ready for you.
Experimental content
Under the above preconditions, ...
Posted by Homer30 on Sun, 20 Feb 2022 04:37:39 +0100
MySQL database (grouping and paging, constraints)
1. Group query
group by , generally used in conjunction with aggregate functions, the found data is meaningful *Fields to query: 1. Grouping field itself 2. Aggregate function
-- For example, I group by part number. For example, there are three departments, and then I calculate the average salary of each department. There should be thre ...
Posted by scottd on Sun, 20 Feb 2022 03:26:58 +0100
Headline: educator -- advanced features of Java - JDBC
Level 1: specify the type of JDBC encapsulation
Task description
This task: encapsulate a JDBC tool class as required.
Relevant knowledge
In order to complete this task, you need to master the basic use of JDBC. Please refer to the previous training content Advanced features of Java - JDBC (Part 1).
This chapter will encapsulate ...
Posted by revdev on Sun, 20 Feb 2022 03:10:29 +0100
Dvwa exercise 06 SQL injection (Low)
brief introduction
SQL injection means that the web application does not judge or filter the legitimacy of the user's input data. The attacker can add additional SQL statements at the end of the query statements defined in advance in the web application, and realize illegal operations without the knowledge of the administrator, so as to d ...
Posted by hrichman on Sun, 20 Feb 2022 02:56:08 +0100