OpenSSL3.0 learning 12 provider cipher CSDN creation punch in

๐Ÿ“’ Blog home page: Actor's blog ๐ŸŽ‰ Welcome to pay attention ๐Ÿ”Ž give the thumbs-up ๐Ÿ‘ Collection โญ Leave a message ๐Ÿ“ โค๏ธ Look forward to communicating together! ๐Ÿ™ The author's level is very limited. If you find an error, please let me know. Thank you! ๐ŸŒบ If you have any questions, you can communicate by private letter!!! ๐ŸŒต outline # ...

Posted by muralimohan001 on Sat, 05 Feb 2022 22:06:19 +0100

Section 21 principle and experiment of ACL (access control list) - filter the data packets on the interface according to the set conditions

1 ACL overview (1) Definition: Access Control List access control list is actually a packet filtering technology. Access Control List (ACL) is an access control technology based on packet filtering. It can filter the data packets on the interface according to the set conditions and allow them to pass or discard. (2) Function: 1) Access co ...

Posted by Xoom3r on Sat, 05 Feb 2022 05:51:04 +0100

Emergency response learning

Intrusion detection windows I Account, process, self start โ‘  Detection account 1. Direct analysis in Windows Open the cmd window and enter lusrmgr MSc command to check whether there is a suspicious account 2. Log analysis "eventvwr.msc #Event viewer and export Windows log -- Security #Analyze with Log Parser Typical command 1,Query th ...

Posted by TwistedLogix on Sat, 05 Feb 2022 02:54:21 +0100

Attack and defense world page 3 8 points

filemanager Inspection point: secondary injection + code audit capability Old rule โ€“ > scan directly The existing directory is found to be Find a www.tar GZ file Combined with the upload function in the web page The idea of guessing this question may be to use the leaked file to audit the code and upload it successfully Get getshell ...

Posted by helz on Fri, 04 Feb 2022 13:21:15 +0100

[attack and defense world CTF | WP] ics-07

subject thinking View interface Open the title and we can see a website that can be operated only through the project management interface. The project management interface is as follows We see a source code link. The source code of the link is as follows <?php session_start(); if (!isset($_GET[page])) { show_sour ...

Posted by pauleth on Tue, 01 Feb 2022 17:34:58 +0100

PHP Code Security 3-Ajax and Logical Payment Problem ("Zero Purchase")

3. AJAX Authentication and Related Logical Payments 1.AJAX Authentication Ajax definition: AJAX is not a specification of JavaScript, it's just an abbreviation for the brother's "invention": Asynchronous JavaScript and XML, meaning to execute asynchronous network requests using JavaScript. Asynchronous: refers to sending multiple d ...

Posted by deezin on Tue, 01 Feb 2022 07:37:56 +0100

Signature algorithm analysis or routine of an e-commerce App in IOS

1, Target Android is getting less and less fun, young man. It's time to play IOS. In fact, the routines are almost the same. Don't be stopped by the Arm assembly. Anyway, Android doesn't talk about martial arts for a long time. Important algorithms are in so, which is almost the same as ios. First, build the package capturing and frida envir ...

Posted by iandotcom on Tue, 01 Feb 2022 01:09:55 +0100

ATT&CK actual combat series - red team actual combat

Environment construction Download address: http://vulnstack.qiyuanxuetang.net/vuln/detail/2/ Official description The red team actual combat series mainly takes the real enterprise environment as an example to build a series of shooting ranges and learn through the trinity of practice, video tutorial and blog. In addition, the actual com ...

Posted by Opticon on Mon, 31 Jan 2022 21:14:40 +0100

[SpringBoot] SpringBoot - Spring Security Framework

6. Spring Boot Security Framework 6.1 Understanding Spring Security Spring Security is dedicated to providing Authentication and Authorization management for Java applications. Certification: This is mainly to solve the problem of who I am by providing evidence to prove that you are the person you say. Authorization: This is mainly to ...

Posted by darklight on Mon, 31 Jan 2022 19:04:21 +0100

Notes on "Introduction to machine learning in Web security": Chapter 7 7.3 naive Bayesian detection WebShell

1. Source code modification (1) Error reporting UnicodeDecodeError: 'gbk' codec can't decode byte 0x9a in position 8: illegal multibyte sequence ย  Load ../data/PHP-WEBSHELL/xiaoma/1148d726e3bdec6db65db30c08a75f80.php Traceback (most recent call last): ...... t=load_file(file_path) for line in f: UnicodeDecodeError: 'gbk' codec can't deco ...

Posted by Fritz on Mon, 31 Jan 2022 08:39:01 +0100