1. Where is the key?
F12 view source code
2. Encrypt again and you will get the key
The encrypted data is xrlvf23xfqwsxsqf
We can encrypt it once.
ROT13 online decoding tool
3. Guess how many times it has been encrypted?
Posted by madcrazy1 on Sat, 19 Feb 2022 14:46:26 +0100
Reference blogs are still Nanshen blog
$num = $_GET['num'];
die("no no no!");
Here is an intval function: get the integer value of the variab ...
Posted by Garcia on Thu, 03 Feb 2022 16:02:35 +0100
There may be a lot of nonsense. It mainly records the process of finding loopholes from so many files
https://blog.csdn.net/rfrder/article/details/113924013 https://blog.csdn.net/miuzzx/article/details/111352849 https://rainy-autumn.top/archives/913
Audit the loopholes written by the group leader three years ago
Posted by greekhand on Thu, 03 Feb 2022 07:00:52 +0100
preg_match : Match regular expression
After pattern separator"i"Tag this is a case insensitive search
In mode\b Mark a word boundary, so only independent words will be matched, such as:
if (preg_match("/\bweb\b/i", "PHP is the web scripting language of choice.")) : True
if (preg_matc ...
Posted by rodin on Wed, 02 Feb 2022 22:16:41 +0100
Download address: http://vulnstack.qiyuanxuetang.net/vuln/detail/2/
The red team actual combat series mainly takes the real enterprise environment as an example to build a series of shooting ranges and learn through the trinity of practice, video tutorial and blog. In addition, the actual com ...
Posted by Opticon on Mon, 31 Jan 2022 21:14:40 +0100
Gongzong No.: black palm A blogger who focuses on sharing network security, hot spots in the hacker circle and hacker tool technology area!
The vulnerability bounty program for discovering this vulnerability does not allow public disclosure, so I will not directly use the system name involved. The project is one of the projects t ...
Posted by monkey72 on Fri, 21 Jan 2022 13:55:43 +0100
According to the monitoring requirements of process behavior, many security software used Hook technology to intercept key system calls to intercept malware process creation. However, under x64 architecture, the system kernel has done a lot of security detection measures, especially technologies like KDP, which makes th ...
Posted by StewardManscat on Thu, 20 Jan 2022 07:20:46 +0100
Welcome new students ... ... If you are nameless, you can concentrate on practicing sword
I am not a salted fish, but a dead fish!
I have seen many installation tutorials of snort3 and snort2 on the Internet, especially the installation of snort3. Bloggers seriously doubt whether they have really installed successfully, People really w ...
Posted by t0ta11 on Wed, 19 Jan 2022 07:08:04 +0100
At present, dandelion and fir are commonly used platforms based on third-party application distribution. After we submit them to the platform, we can download them by scanning the application QR code. For example, the dandelion platform is as follows:
So the above is a very common operation process. The problem is: how to download the IPA in ...
Posted by prasadharischandra on Wed, 19 Jan 2022 02:44:33 +0100
Gongzong No.: Black palm A blogger who focuses on sharing penetration testing, hot spots in the hacker circle and hacker tool technology area!
During intranet penetration, a WebShell or CobaltStrike, Metasploit, etc. are just the beginning. It is more about moving horizontally within the intranet, expanding the results and reaching ...
Posted by Crashin on Sat, 15 Jan 2022 23:04:25 +0100