CC2 of "idiot" God perspective regulating deserialization chain

The reason for the idiot God perspective is that we got the poc, and the simulation didn't know any details to analyze the cause of this vulnerability. It can also be said that the semi black box state is mainly to exercise the analysis ability. The analysis of CC1 has been published in previoUTF-8...

Posted by apoc- on Tue, 28 Sep 2021 16:30:25 +0530

Write a simple summary of Windows Shellcode ideas with ASM

What is shellcode? "Code or data, as long as it is location independent binary, it is shellcode." In order to write location independent code, you need to pay attention to the following points: You cannot use a direct offset on a string, you must store the string on the stackdll. Since ASLR wiUTF-8...

Posted by Kibit on Thu, 30 Sep 2021 02:27:21 +0530

Implementing https requests with Java/SpringBoot

Tip: the following is the main content of this article. The following cases can be used for reference 1, https and http Hypertext Transfer Protocol HTTP protocol is used to transfer information between Web browser and Web server. HTTP protocol sends content in clear text without providing any UTF-8...

Posted by amitshah on Fri, 08 Oct 2021 22:41:45 +0530

[Web security] injection book -- the cornerstone of SQL injection

It is better to teach people to fish than to teach people to fish Try to be concise and explain the principle of bypass mode clearly in this article [View information] Unsuitable population: 1. A boss who knows the principles of sql injection like the back of his hand 2. Novice without any datUTF-8...

Posted by viperdk on Tue, 19 Oct 2021 07:30:20 +0530

Network attack and defense | how to hide your CobaltStrike server

Author: overture Disclaimer: This article is only for study and research. It is strictly prohibited to engage in illegal activities. Any consequences shall be borne by the user himself. 0x00 Preface This paper provides several methods to hide the cs server and reduce the probability of discoverUTF-8...

Posted by Lol5916 on Wed, 20 Oct 2021 22:58:29 +0530

LVS load balancing cluster

preface In various Internet applications, as the site has higher and higher requirements for hardware performance, response speed, service stability and data reliability, it will be difficult for a single server to bear all access (i.e. the requirements of load balancing and high availability)UTF-8...

Posted by jax_15 on Thu, 21 Oct 2021 00:11:31 +0530

Python Non-Blocking Sockets, Socket Port Reuse, Non-Blocking IO Network Model

Preface Over the years, I have been crawling in the it industry. Along the way, I have summarized a number of high-frequency interviews in python industry. I have seen most of the new blood, and I still have a variety of difficult questions or answers for a variety of interview questions. So I'UTF-8...

Posted by deathrider on Thu, 21 Oct 2021 23:37:24 +0530

As place

catalogue Simple example implementation User space processing One of the advantages of Linux is its network function. Many network products such as routers and switches are based on Embedded Linux operating system. Network filtering is a good infrastructure in the Linux kernel, which enables uUTF-8...

Posted by Mirkules on Fri, 22 Oct 2021 13:36:10 +0530

j computer network single person chat

The first experiment of computer network: design and write a chat program using Socket Basic Requirements Design a two person chat protocol, which requires chat information with time tags. Design the chat program. Under Windows system, the designed program is realized by using the streaming SocUTF-8...

Posted by koolaid on Sat, 23 Oct 2021 20:55:18 +0530

Network address translation (NAT)

Reprinted from the original work of the author who is lost GoodMai haomai.com ------------------------------------------------------------------------------------------------------------------------------------------ NAT NAT (Network Address Translation), also known as network address translatUTF-8...

Posted by Earnan on Mon, 25 Oct 2021 05:35:00 +0530