Article Tags
How to reasonably use DNSLOG to conduct echo-free security testing

How to reasonably use DNSLOG to conduct echo-free security testing

When actually testing the security issues of some websites, there is no response after execution of some test commands. We can write scripts to perform blind injection, but some websites will block our IP address, so we can set up an IP proxy Pool solution, but blind injection is often very inefficient, so DNSlog injection is produced. Before using dnslog, we need to understand the backtick symbol: Symbol: `Name: backtick, upper delimiter position: backtick, this character is generally in the upper left corner of the keyboard, to the left of the number 1, do not confuse it with single quotes Function: The string enclosed in backticks is interpreted by the shell as a command line. When executed, the shell first executes the command line and replaces the entire backticks with its standard output result.

May 25, 2023 am 08:04 AM
dbslog
How to get started quickly with Nmap

How to get started quickly with Nmap

1. Install https://nmap.org/ without going into too much detail. 2. Target machine construction. The target machine used in this article is OWASPBrokenWebApplicationsProject https://sourceforge.net/projects/owaspbwa/ Target machine address 1: 192.168.154.128 target machine address 2: 192.168.3.73. Command line C:\Users\Torjan>nmap--helpNmap7.80(https://nmap.org)Usage:nmap[ScanType(s)][Options]{tar

May 24, 2023 pm 11:37 PM
nmap
Example analysis of discovering Google Cloud Platform vulnerabilities and receiving bounty

Example analysis of discovering Google Cloud Platform vulnerabilities and receiving bounty

The following tells the story of a 17-year-old Uruguayan high school student who was interested in information security. Through study and research, he independently discovered a vulnerability in the Google Cloud Platform and received $7,500 (previously, he had discovered a Google host header leak vulnerability worth $10,000). Before talking about the specific details of this vulnerability, I hope readers have some understanding of Google Cloud services and API mechanisms, and can first familiarize themselves with several related concepts. Leading Concept Google runs a management service called Google Service Management, through which Google manages the internal and external interfaces of various application Google systems and cloud services created by users. Under GoogleServiceManagement, users can

May 24, 2023 pm 10:07 PM
Google
What are the steps for computer network troubleshooting?

What are the steps for computer network troubleshooting?

(1.) Ping127.0.0.1 (If it fails, it means there is a hardware problem. Check whether the network card is installed correctly.) (2.) Ping your local IP (If it fails, it means that TCP/IP is not set correctly. Check if the IP The settings are correct, and confirm that they are not blocked by the firewall) (3) Ping gateway (number) (unavailable, indicating that the main import and export routers in the network environment are faulty or have incorrect settings, causing packets to be unable to enter and exit, and thus unable to connect to other servers) ) (4) Ping the gateway (domain name) (cannot work, it may be a DNS problem) (5) Ping the other party’s IP or website (cannot work, it means there is a problem with the other party’s network server, it may be temporarily shut down or the server is faulty, the reason for the failure is with you irrelevant)

May 24, 2023 pm 09:46 PM
计算机网络
How to build SOAR

How to build SOAR

Companies considering purchasing a security orchestration, automation, and response (SOAR) solution often worry that their existing incident response programs are not yet mature enough to implement a comprehensive platform with automation and orchestration capabilities. Starting from scratch can seem overwhelming when you have almost no foundation, especially if no one on the team has experience with incident response or security orchestration solutions. Although no one wants to just add automation to an inefficient process, it is obviously unscientific to further consolidate this old way of handling security incidents if the old method itself is no longer good enough. If you want to improve your company's security operations but don't know where to start, the following steps may help you prepare to move to a SOAR platform. 1. Take stock of the current operating conditions and think that you do not

May 24, 2023 pm 08:06 PM
soar
What are the differences between mesh networking and wireless bridging?

What are the differences between mesh networking and wireless bridging?

Differences: 1. Different networking modes. Wireless bridge communicates in point-to-point or point-to-multipoint mode. Antenna applications are mainly directional transmission. In Mesh ad hoc network, all devices have equal status in the wireless network. Any A network node can access the wired network. 2. The transmission distance is different. 3. The transmission rates are different. The bridge transmission rates are mainly 300Mbps and 866Mbps. The Mesh rate is not obvious compared to the traditional bridge. 4. The communication frequencies are different. What is mesh networking? Mesh networking is a "wireless mesh network". It is a "multi-hop" network. It is developed from the adhoc network and is one of the key technologies to solve the "last mile" problem. Evolving to next-generation networks

May 24, 2023 pm 05:54 PM
mesh
NTP configuration example analysis

NTP configuration example analysis

1. Configure the network device as an NTP server. 1. Configure the NTP master clock ntp-servicerefclock-master22. Enable NTP authentication ntp-serviceauthenticationenable3. Configure the NTP clock source local interface, which does not need to be configured. ntp-servicesource-interfaceloopback04, configure the NTP server service authentication password ntp-serviceauthentication-keyid1authentication-modemd5cipheradmin5, configure the trusted secret key number ntp-servi

May 24, 2023 pm 03:01 PM
ntp
What are the 9 commonly used automated testing frameworks for Android?

What are the 9 commonly used automated testing frameworks for Android?

Difficulties in automated testing of mobile APPs Automated UI testing of mobile APPs has long been a difficulty. The difficulty lies in the "changes" of the UI. Changes lead to a large number of maintenance of automated use cases. From the perspective of layered testing, automated testing should be performed layer by layer. The largest amount of automated testing should be unit testing, which is the easiest to implement and find problems at an early stage; followed by interface-level testing, which is automated for the purpose of verifying logic. Since the interface is relatively stable, the cost of automated testing is relatively acceptable; The largest automation cost is UI-level automated testing. However, the UI interface is a direct feedback display to the user. Moderate, especially BVT-level automated testing is also very necessary. In order to get rid of these, some automated testing needs to be introduced

May 24, 2023 pm 02:41 PM
Android
How to use Cryptsetup to encrypt USB flash drive

How to use Cryptsetup to encrypt USB flash drive

Nowadays, the storage and data transmission capabilities of U disks are very strong, and they can run across various platforms. The storage space has even reached 256G, which is comparable to the capacity of ordinary hard disks in the past. Here, we will show you how to encrypt a USB flash drive, so my mother no longer has to worry about me following in the footsteps of Teacher Chen... The Importance of Protecting USB Flash Drives Theft of laptops and USB flash drives has been one of the main causes of data breaches in the past few years. However, compared to laptops, people usually pay less attention to the security of USB flash drives. But if a criminal steals a USB flash drive worth only $12, it may cost a company around a million dollars. As U disk storage capacity increases and its price gradually decreases, you can easily

May 24, 2023 pm 01:07 PM
U盘 cryptsetup
What is the principle of fragmentation and assembly of IP datagrams?

What is the principle of fragmentation and assembly of IP datagrams?

When a piece of data is sent from one host to another through a router, it must be forwarded through many routing layers. The process is quite complicated, so in what form does IP forward the datagram to the destination host at the routing layer, and how does it process it? First we need to understand the format of the datagram: IP forwarding and control are determined by the header of the IP datagram. The value of the 4-bit header length is based on 4 bytes. The minimum value is 5, which means that the header length is the smallest. It is 4x5=20 bytes, which is the IP header without any options. The maximum value represented by the 4-bit table is 15, which means that the maximum header length is 60 bytes. The 8-bit TOS field has 3 bits to specify the IP The priority of the datagram (currently obsolete), there are 4 bits to indicate

May 24, 2023 am 11:12 AM
ip
How to analyze the rpm package management function

How to analyze the rpm package management function

Rpm package management function fully understands the function of software package management: packaging the components of the compiled program into one or several package files, in order to facilitate the installation, upgrade, uninstallation, query, verification, and database of the program package maintain. Let's take a look at the analysis of RPM package management. Rpm packages have great applications in redhat and S.U.S.E. Next, we will do some detailed functional analysis on the management of rpm packages in the centos system. Using yum (rhel series), it can be automatically installed during installation. Resolve dependencies drpm package naming format: name-VERSION-release.arch.rpmVERSION: major.minor.releaseMajor

May 24, 2023 am 09:01 AM
rpm
[Defect Weekly] Issue 31: Wrong memory release

[Defect Weekly] Issue 31: Wrong memory release

1. Wrong memory release method. Common memory application functions in C language include malloc(), realloc(), and calloc(). Although they have different functions, they all correspond to the same memory release function free(). The function of memory in C++ Application and release adopt new/delete, new[]/delete[] methods. Regardless of whether it is C language or C++ language, when writing source code, you must choose the memory release method according to the different memory application methods to avoid using the wrong memory release. For example: mixed use of C/C++ memory allocation/release, or mixed use of scalar and vector memory allocation/release. 2. The harm of wrong memory release method. Using the wrong memory release method,

May 23, 2023 pm 11:07 PM
代码审计
How to configure Cisco 2960

How to configure Cisco 2960

Enable SNMP service SW_21_251(config)#snmp-servercommunitypublicROSW_21_251(config)#snmp-serverenabletrapsSW_21_251(config)#snmp-serverhost10.80.21.188publicVTY password encryption SW_21_251(config)#servicepassword-encryptionbanner configuration SW_21_251(config)#bannermotd #WelcomeCT_Switch1

May 23, 2023 pm 11:01 PM
cisco
How does the Struts2 S2-059 remote code execution vulnerability reproduce?

How does the Struts2 S2-059 remote code execution vulnerability reproduce?

0x00 Introduction Struts2 is a very powerful JavaWeb open source framework launched by the Apache software organization, which is essentially equivalent to a servlet. Struts2 is based on MVC architecture and has a clear framework structure. It is usually used as a controller to establish data interaction between models and views, and is used to create enterprise-level Java web applications. It utilizes and extends the JavaServletAPI and encourages developers to adopt the MVC architecture. Struts2 takes the excellent design ideas of WebWork as the core, absorbs some advantages of the Struts framework, and provides a neater Web application framework implemented in the MVC design pattern. 0x01 vulnerability

May 23, 2023 pm 10:37 PM
struts2

Hot tools Tags

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

vc9-vc14 (32+64 bit) runtime library collection (link below)

vc9-vc14 (32+64 bit) runtime library collection (link below)

Download the collection of runtime libraries required for phpStudy installation

VC9 32-bit

VC9 32-bit

VC9 32-bit phpstudy integrated installation environment runtime library

PHP programmer toolbox full version

PHP programmer toolbox full version

Programmer Toolbox v1.0 PHP Integrated Environment

VC11 32-bit

VC11 32-bit

VC11 32-bit phpstudy integrated installation environment runtime library

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use