Small ideas of session utilization

Small ideas of session utilization preface When doing questions, we often take into account the use of session. There are two common basic types: session file inclusion and session deserialization. We haven't summarized it in detail before, so let's write it. session file contains php.ini session related configuration session.upload_progr ...

Posted by bliljerk101 on Fri, 07 Jan 2022 13:45:14 +0100

How to prevent sql injection and parameter passing in mybatis

environment mysql is used. The database name is test and contains 1. The table name is users. The data in users is as follows SQL injection under JDBC There are two methods to execute SQL statements under JDBC, namely Statement and PrepareStatement, in which PrepareStatement is precompiled Statement SQL statement SELECT * FROM users W ...

Posted by dropfaith on Sun, 02 Jan 2022 23:24:57 +0100

Basic knowledge suitable for beginners - SSTI vulnerability learning

Introduction to SSTI MVC MVC is a framework mode. Its full name is Model View Controller. That is, model - View - controller Under the guidance of MVC, in the development, a method of separating business logic, data and interface display is used to organize the code, gather the business logic into one component, and get better development a ...

Posted by Jurik on Sun, 02 Jan 2022 15:02:35 +0100

Crack the slider verification code of station B with Python+Selenium, the road of information security

preface The simulated Login operation of station B is realized by selenium. No more nonsense. Let's start happily~ Effect demonstration development tool Python version: 3.6 four Related modules: selenium module; And some python built-in modules. Chromedriver: Download the driver matching the Google browser version on your computer in ...

Posted by ivytony on Wed, 22 Dec 2021 03:26:03 +0100

Note the primary Sql injection combined with secondary injection and error reporting injection

preface: The article was first published in https://sleepymonster.cn This is a question for the finals of the 2021 Jinan University freshman competition. At that time, I was gambling. If I did it, I would win the second prize Unfortunately, the network is not powerful enough to suck out second times without changing the script. But I'v ...

Posted by Craig_H on Tue, 07 Dec 2021 23:52:20 +0100

[introduction to IOV security] i. popular science on common terms of Internet of vehicles security

Welcome new students ... ... If you are nameless, you can concentrate on practicing sword I am not a salted fish, but a dead fish! Common terms of Internet of vehicles security 0x01 train end       Internet of Vehicle (IoV) is a technology integrating mobile Internet and Internet ...

Posted by bri4n on Fri, 19 Nov 2021 18:09:26 +0100