Data security transmission platform project note-1
Project introduction and cryptography knowledge
Overall structure of the project:
Main function: encrypt and decrypt the data of network communication
Basic components:
Data serialization: protobufsocket communication: thread pool, connection poolShared memory IPCoracle Database: using OCI interfaceData encryption: openssl (Secure Sockets ...
Posted by gwolgamott on Wed, 02 Mar 2022 16:21:15 +0100
[Java security] fastjson learning
preface
As a supplement to the previous article, learn fastjson after half a year.
Initial recognition of fastjson
Fastjson is a Java library that can convert Java objects into JSON format. Of course, it can also convert JSON strings into Java objects.
Fastjson can manipulate any Java object, even some pre-existing objects without source co ...
Posted by bladechob on Tue, 01 Mar 2022 14:14:07 +0100
SpringBoot -- Security Management
1, Role inheritance
Generally speaking, there are relationships between roles, such as ROLE_admin generally has the authority of admin and user. So how to configure this role inheritance relationship? In Spring Security, developers only need to provide a role hierarchy. for example SpringBoot_ Management (II) As an example, assume ROLE_dba ...
Posted by richie19rich77 on Mon, 28 Feb 2022 16:48:17 +0100
Security Learning of FPM and FTP
preface
Here is a brief summary of some attacks on FPM and FastCGI
Pre knowledge
What is CGI?
Early Web servers could only respond to the request for HTTP static resources sent by the browser and return the static resources stored in the server to the browser. With the development of Web technology, dynamic technology gradually appea ...
Posted by ColinP on Sun, 27 Feb 2022 11:40:25 +0100
The [CTFshow] file contains web78-web81
web78
if(isset($_GET['file'])){
$file = $_GET['file'];
include($file);
}else{
highlight_file(__FILE__);
}
See the include function in the source code. This means that the php file is imported from the outside and executed. If the execution is unsuccessful, the source code of the file is returned.The get parameter of the file ...
Posted by pineapple1 on Fri, 25 Feb 2022 15:16:21 +0100
DVWA learning notes
Security Level: LOW
Brute Force
Source code analysis:
<?php
if( isset( $_GET[ 'Login' ] ) ) {
// Get username
$user = $_GET[ 'username' ];
// Get password
$pass = $_GET[ 'password' ];
$pass = md5( $pass );
// Check the database
$query = "SELECT * FROM `users` WHERE user = '$user' AND password = '$pass';"; ...
Posted by brucemalti on Fri, 25 Feb 2022 02:00:17 +0100
Arbitrary Code Execution Vulnerability
catalogue
1, What is an arbitrary code execution vulnerability
2, Harm of vulnerability
3, Arbitrary Code Execution Vulnerability
1. Exploit of eval() function
Exploit function (1 EVAL)_ one
1.2 exploit of eval() function_ two
1.3. Exploit of eval() function_ three
1.4preg_replace+/e utilization
2.assert() function
3.preg_replace(); ...
Posted by wpsd2006 on Wed, 23 Feb 2022 13:13:44 +0100
Spring -- Annotation usage of Security framework
preface
In the previous security, relevant configurations and tests were conducted for configuration items.
But these are based on security config. Myconfig #configure (org. Springframework. Security. Config. Annotation. Web. Builders. Httpsecurity) to restrict the permission of the corresponding request.
If there are multiple reque ...
Posted by rnintulsa on Wed, 23 Feb 2022 05:33:02 +0100
Spring -- permission restriction of Security framework
preface
Last blog The Security framework imposes restrictions on requests In, login authentication is added for some requests.
As long as the login is successful, you can access the restricted requests.
However, this model is certainly not enough.
For example: Taobao product page. Merchants can modify commodity prices, but custo ...
Posted by nosmasu on Tue, 22 Feb 2022 13:05:49 +0100
Phishing practice 2 -- combined email web page
Add the previous article, a word binding idea
Combine front-end pages for fishing
Flash fishing
xss_ Flash fishing full set of source code Self flash fishing another set of source code 1.1 combined flash fishing pop-up version The source code from tools I feel that the masters are very strong Direct download pop-up Throw the js file of the ...
Posted by anups on Tue, 22 Feb 2022 12:15:43 +0100