Small ideas of session utilization
Small ideas of session utilization
preface
When doing questions, we often take into account the use of session. There are two common basic types: session file inclusion and session deserialization. We haven't summarized it in detail before, so let's write it.
session file contains
php.ini
session related configuration
session.upload_progr ...
Posted by bliljerk101 on Fri, 07 Jan 2022 13:45:14 +0100
How to prevent sql injection and parameter passing in mybatis
environment
mysql is used. The database name is test and contains 1. The table name is users. The data in users is as follows
SQL injection under JDBC
There are two methods to execute SQL statements under JDBC, namely Statement and PrepareStatement, in which PrepareStatement is precompiled
Statement
SQL statement
SELECT * FROM users W ...
Posted by dropfaith on Sun, 02 Jan 2022 23:24:57 +0100
Basic knowledge suitable for beginners - SSTI vulnerability learning
Introduction to SSTI
MVC MVC is a framework mode. Its full name is Model View Controller.
That is, model - View - controller Under the guidance of MVC, in the development, a method of separating business logic, data and interface display is used to organize the code, gather the business logic into one component, and get better development a ...
Posted by Jurik on Sun, 02 Jan 2022 15:02:35 +0100
Crack the slider verification code of station B with Python+Selenium, the road of information security
preface
The simulated Login operation of station B is realized by selenium. No more nonsense. Let's start happily~
Effect demonstration
development tool
Python version: 3.6 four
Related modules:
selenium module;
And some python built-in modules.
Chromedriver: Download the driver matching the Google browser version on your computer in ...
Posted by ivytony on Wed, 22 Dec 2021 03:26:03 +0100
Note the primary Sql injection combined with secondary injection and error reporting injection
preface:
The article was first published in https://sleepymonster.cn
This is a question for the finals of the 2021 Jinan University freshman competition.
At that time, I was gambling. If I did it, I would win the second prize
Unfortunately, the network is not powerful enough to suck out second times without changing the script.
But I'v ...
Posted by Craig_H on Tue, 07 Dec 2021 23:52:20 +0100
[introduction to IOV security] i. popular science on common terms of Internet of vehicles security
Welcome new students ... ... If you are nameless, you can concentrate on practicing sword
I am not a salted fish, but a dead fish!
Common terms of Internet of vehicles security
0x01 train end
Internet of Vehicle (IoV) is a technology integrating mobile Internet and Internet ...
Posted by bri4n on Fri, 19 Nov 2021 18:09:26 +0100