
-
All
-
web3.0
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Backend Development
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Web Front-end
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Database
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Operation and Maintenance
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Development Tools
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
PHP Framework
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Common Problem
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Other
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Tech
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
CMS Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Java
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
System Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Computer Tutorials
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Hardware Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Mobile Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Software Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Mobile Game Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-

What are the three levels of database security?
1. System level The main aspects that need attention at the system level are the following: 1. User management. Different users have different permissions. You can set users with only read permissions and read-write permissions as needed. Special users (similar to the root user under Linux) can start and stop the system. Read-write users are mainly used for daily operations. maintenance work. 2. File management. That is, some important files require special protection, which needs to be implemented in cooperation with the user. 3. Password management. Passwords need to be changed regularly, and too many attempts cannot be made, otherwise the password will be frozen. 4. System log. The importance of system logs to the system is self-evident, and many problems can be solved through logs. 2. At the database level, every DBRM system has
May 13, 2023 pm 09:46 PM
What are the knowledge points of Appium framework?
1. Test object Appium is an open source tool used to automate native, mobile web and hybrid applications on iOS, Android devices and Windows desktop platforms. "Native apps" refer to those apps written with iOS, Android or Windows SDK. "Mobile web applications" are applications accessed using a mobile browser (Appium supports Safari and Chrome on iOS and the built-in browser on Android). "Hybrid apps" have a wrapper around a "webview" - a native control for interacting with web content.
May 13, 2023 pm 09:37 PM
How to perform NetDataContractSerializer deserialization vulnerability analysis
1. Preface NetDataContractSerializer and DataContractSerializer are used to serialize and deserialize data sent in Windows Communication Foundation (WCF) messages. There is an important difference between the two: NetDataContractSerializer includes the CLR, adding extra information through CLR types and saving references to support type precision, while DataContractSerializer does not. Therefore, NetDataContr can only be used if the same CLR type is used on the serialization and deserialization sides
May 13, 2023 pm 09:37 PM
How to convert .P7B certificate to .PFX
Convert .P7B to .PFX1, download the openssl tool, (here takes the windows system as an example) https://www.chinassl.net/download/d1.html2, format conversion P7B (PKCS#7), a P7B file contains a certificate and a text file of the certificate chain, but not the private key. PFX (PKCS#12) specifies a portable format for storing and transmitting user or server private keys, public keys, and certificates. It is a binary format and these files are also called PFX files. One thing to note when converting P7B to PFX is that in order to do the conversion, you must have the certificate cert.p7b file and the private key cert.key file.
May 13, 2023 pm 09:04 PM
How to conduct APT organization tracking and governance based on knowledge graph
Advanced persistent threats (APTs) are increasingly becoming a major threat in cyberspace that cannot be ignored against important assets of governments and enterprises. Since APT attacks often have clear attack intentions, and their attack methods are extremely concealed and latent, traditional network detection methods are usually unable to effectively detect them. In recent years, APT attack detection and defense technologies have gradually attracted the attention of governments and network security researchers from various countries. 1. Research related to the governance of APT organizations in developed countries 1.1 At the strategic level, the United States emphasizes "America First" and "Promoting Peace through Strength." The Trump administration has successively released the "National Security Strategy Report", "Department of Defense Cyber Strategy" and "National Cyber Strategy" ”, explains Trump’s “America First” strategy, emphasizing “cyber deterrence” and
May 13, 2023 pm 08:37 PM
How to analyze reflected XSS
1. Reflected XSS Reflected XSS means that the application obtains untrustworthy data through Web requests and transmits it to Web users without checking whether the data contains malicious code. Reflected XSS is generally constructed by the attacker with malicious code parameters in the URL. When the URL address is opened, the unique malicious code parameters are parsed and executed by HTML. It is characterized by non-persistence and requires the user to click on a link with specific parameters. can cause. The editor takes the JAVA language source code as an example to analyze CWEID80:ImproperNeutralizationofScript-RelatedHTMLTagsinaWebPage(BasicXSS)2.
May 13, 2023 pm 08:13 PM
How to use Bluetooth function to attack and unlock Tapplock smart padlock within two seconds
A few weeks ago, a YouTuber named JerryRigEverything uploaded a teardown video of the Tapplock Smart Bluetooth Fingerprint Padlock. The video shows that the Tapplock back cover can be removed by simply using a GoPro camera to fix the adhesive base, and then using a screwdriver to easily open the Tapplock lock. It’s a bit incredible. This video aroused my curiosity about the security of Tapplock smart padlock. This smart padlock has fingerprint recognition, mobile phone Bluetooth and Morse code unlocking. While it is convenient, how safe is it? From this, I conducted some research on Tapplock, and finally I achieved the unlocking of Tapplock within 2 seconds.
May 13, 2023 pm 07:49 PM
How to do an introduction to Wireshark
Anyone who studies networking must be familiar with Wireshark, but I only knew how to use Wireshark before, and the technical level was very shallow. In the 2015 information security management and assessment national competition test questions, high requirements were placed on the use of Wireshark. In addition, there is a foreign network security tool ranking list (http://sectools.org/), which includes: 125 security tools, among which Wireshark ranks first on the list. All of this prompted the determination to systematically learn Wireshark and use it as the next blog topic after DVWA. Wireshark is currently the most widely used open source packet capture software.
May 13, 2023 pm 06:55 PM
How to use APT framework TajMahal
Overview 'TajMahal' is a previously unknown and technically complex APT framework discovered by Kaspersky Lab in the fall of 2018. This complete spy framework consists of two packages named "Tokyo" and "Yokohama". It includes backdoors, loaders, orchestrators, C2 communicators, voice recorders, keyloggers, screen and webcam grabbers, document and encryption key stealers, and even the victim machine's own file indexer. We found up to 80 malicious modules stored in its encrypted virtual file system, which is one of the highest number of plugins we have seen in an APT tool set. To highlight its capabilities, TajMahal is able to etch files from the victim as well as the printer queue.
May 13, 2023 pm 06:43 PM
How to use sqlmapGetshell
sqlmap reads and writes files –file-read: reads files from the back-end database management system file system –file-write: edits local files on the back-end database management system file system (writes from local) –file-dest : The absolute path to the file written by the back-end database management system (write target path). You can use the above commands to read and write the system file after SQL injection, but the prerequisite is that you need to have read and write permissions and be a dba. permissions, otherwise read and write operations cannot be performed successfully. Taking DVWA as an example, build DVWA under kali to read and write files. Read the file: Check the relevant information in PHPinfo, use -file-r
May 13, 2023 pm 06:25 PM
How to solve the arbitrary file deletion vulnerability in WordPress plugin WooCommerce
Technical details: WordPress’s permission processing mechanism is mainly implemented by providing different functions for different roles. When the store administrator role is defined, it will assign the edit_users function to this role so that they can directly manage the store’s customer accounts. . The entire permission assignment process occurs during the installation process of the plug-in. woocommerce/includes/class-wc-install.php://Shopmanagerrole.add_role('shop_manager',//Internalnameofthenewrole&
May 13, 2023 pm 06:16 PM
How to analyze and detect Rapid ransomware virus
Ransomware has always been a hot topic in the security industry. Recently, security personnel have discovered a ransomware called rapid. This ransomware uses RSA and AES to encrypt files. It will not only infect existing files on the computer, but also Encrypt newly created files. This article conducts a detailed analysis of the rapid virus, analyzes its encryption mechanism, and parses its encrypted files. 1. Overview When the rapid virus runs, it will create multiple threads to continuously scan the file system and encrypt files. It will not only infect existing files on the computer, but also encrypt newly created files. The encrypted file has a ".rapid" extension added to its file name, and the file size is increased by 0x4D0 bytes. rapid virus
May 13, 2023 pm 06:10 PM
How to view Struts2 historical vulnerabilities from a protection perspective
1. Introduction The Struts2 vulnerability is a classic series of vulnerabilities. The root cause is that Struts2 introduces OGNL expressions to make the framework flexible and dynamic. With the patching of the overall framework improved, it will now be much more difficult to discover new Struts2 vulnerabilities than before. Judging from the actual situation, most users have already repaired historical high-risk vulnerabilities. Currently, when doing penetration testing, Struts2 vulnerabilities are mainly left to chance, or it will be more effective to attack unpatched systems after being exposed to the intranet. Online analysis articles mainly analyze these Struts2 vulnerabilities from the perspective of attack and exploitation. As the new H3C offense and defense team, part of our job is to maintain the rule base of ips products. Today we will review this system.
May 13, 2023 pm 05:49 PM
How to reproduce arbitrary file download vulnerability in Webug shooting range
Brief description of the vulnerability: Due to business needs, some websites may provide file viewing or downloading functions. If there are no restrictions on the files that users can view or download, then malicious users can view or download some sensitive files, such as configuration information, source code files, etc. Cause of the vulnerability: There is a function to read files. The path of reading files is user-controllable and has not been verified or the verification is not strict. The file content is output. Hazards of the vulnerability: downloading arbitrary files on the server, such as script codes, services and system configuration files, etc. Further Use the information gained to do greater harm. The obtained code can be used for further code audit to obtain more exploitable vulnerabilities. Experimental environment: Webug shooting range homepage BP packet capture. We change the URL path to and send it to the repeater module in repe
May 13, 2023 pm 05:40 PM
Hot tools Tags

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

vc9-vc14 (32+64 bit) runtime library collection (link below)
Download the collection of runtime libraries required for phpStudy installation

VC9 32-bit
VC9 32-bit phpstudy integrated installation environment runtime library

PHP programmer toolbox full version
Programmer Toolbox v1.0 PHP Integrated Environment

VC11 32-bit
VC11 32-bit phpstudy integrated installation environment runtime library

SublimeText3 Chinese version
Chinese version, very easy to use
