current location:Home > Technical Articles > Operation and Maintenance > Safety

  • What are the differences between mesh networking and wireless bridging?
    What are the differences between mesh networking and wireless bridging?
    1. Networking mode 1. Wireless bridging is point-to-point or point-to-multipoint networking communication, which is mainly based on directional transmission. 2. Mesh means that all devices have equal status in the wireless network, and any network node can access the wired network. 2. Distance 1. Wireless bridging is mainly based on fixed point monitoring, and different antenna selections are selected according to different scenarios. 2. The characteristic of mesh is that it is very flexible in deployment. The antennas used with Mesh ad hoc network equipment are mainly omnidirectional antennas, which can quickly establish the system. 3. Transmission rate 1. The design transmission rate of the bridge is mainly 300Mbps and 866Mbps. Specifications 2. The configuration of the antenna is mainly omnidirectional antenna, which has relatively large attenuation. Therefore, the speed is not obvious compared with traditional bridges. Four, pass
    Safety 7690 2023-05-13 11:37:05
  • Struts2-052 vulnerability example analysis
    Struts2-052 vulnerability example analysis
    Preface On September 5, 2017, a serious vulnerability discovered by security researchers from the foreign security research organization lgtm.com was officially released in Apache Struts2. The vulnerability number was CVE-2017-9805 (S2-052). An attacker can pass in a carefully constructed XML data, remote command execution. There is a deserialization vulnerability in the XStream component of the Struts2REST plug-in. When using the XStream component to deserialize data packets in XML format, the data content is not effectively verified, which poses a security risk and can be executed by remote commands. Exploit conditions: Using REST plugin and within the affected version range. Exploitation method: The attacker constructs malicious data packets for remote exploitation.
    Safety 1480 2023-05-13 11:25:06
  • How to encrypt Android apk released by unity
    How to encrypt Android apk released by unity
    Security Issues of the Unity3D Program Code Security Issues The core assembly file Assembly-CSharp.dll of the Unity3D program is a standard .NET file format and comes with rich metadata information such as method names, class names, type definitions, etc. You can use tools such as DnSpy to It can be easily decompiled and tampered with, and the code logic, class names, method names, etc. can be seen at a glance. Once the code logic is decompiled, it is easy to breed various types of plug-ins and destroy the balance of the game. If there are loopholes in the code logic, it is easy to be discovered and exploited, which may cause unpredictable losses to developers. Resource security issues: During the compilation and packaging phase, the Unity3D program will package resources into AssetBun through the Unity editor.
    Safety 2034 2023-05-13 11:10:22
  • How to use Nishang, the PowerShell penetration testing tool
    How to use Nishang, the PowerShell penetration testing tool
    Initial PowerShell, first let's understand the concept: PowerShell can be regarded as an upgraded version of cmd (bat scripting language), which is a scripting language on the Windows platform. It is object-oriented and closely related to .NetFrameWork. It can also be thought of as the bashshell on Windows. Windows PowerShell is a command line shell and scripting environment that enables command line users and script writers to take advantage of the power of the .NET Framework. It introduces a number of very useful new concepts, further extending what you get in the Windows Command Prompt and WindowsHost environments
    Safety 1849 2023-05-13 10:58:20
  • What is the way from XML to remote code execution
    What is the way from XML to remote code execution
    What is XXE? Simply put, XXE is XML external entity injection. When external entities are allowed to be referenced, by constructing malicious content, it may cause harm such as arbitrary file reading, system command execution, intranet port detection, and attacks on intranet websites. For example, if the program you are currently using is PHP, you can set libxml_disable_entity_loader to TRUE to disable external entities for defense purposes. Basic exploitation usually involves an attacker injecting payload into an XML file. Once the file is executed, local files on the server will be read, and access to the internal network will be initiated to scan internal network ports. In other words, XXE is a way to reach various services locally. also,
    Safety 1421 2023-05-13 10:04:21
  • How to conduct range practice with bee-box LDAP injection
    How to conduct range practice with bee-box LDAP injection
    If the essence of sql injection is to splice strings, then the essence of everything that can be injected is to splice strings. LDAP injection is no exception as a kind of injection. What is more interesting is that it is splicing parentheses (sql injection is also concatenates parentheses, but it is more conventional to say that it concatenates strings). In the environment configuration chapter, the configuration of the ldap environment in bee-box has been discussed in great detail. The shooting range practice chapter is more about the connection process between php and ldap, the introduction of the special functions used in the middle, and some techniques for splicing parentheses. Let’s first talk about the login process of the ldap shooting range in bwapp: First, this is an LDAP login interface, the URL is http://192.168.3.184/bW
    Safety 2229 2023-05-13 09:49:05
  • How to conduct analysis to bypass WTS-WAF
    How to conduct analysis to bypass WTS-WAF
    0x01. Looking for the target inurl:.php?id=intext: Electrical Appliances I found a website of an electrical appliances company. I tested it casually and found that there is a waf but it has not been arranged yet (I found some information and it seems that you can just add a sign instead of a space. Directly Try) 0x02. The operation found that there was no waf to intercept the data and it also said sqlmap.py-uhttp://*/*.php?id=29--tables--tamperspace2plus.py tool. I tried it and found that it could not be started. .....0x03.Hand-note http://*/*.php?id=1+and+1=1#The echo is normal http://*/*.php?id=1
    Safety 2527 2023-05-13 09:40:12
  • How to conduct in-depth analysis of the exploitation process of Apache HTTP component privilege escalation vulnerability
    How to conduct in-depth analysis of the exploitation process of Apache HTTP component privilege escalation vulnerability
    Apache HTTP was found to have a local privilege escalation vulnerability (CVE-2019-0211). The author of the vulnerability immediately provided the WriteUp and vulnerability EXP. Alpha Labs also conducted an in-depth analysis of the EXP. Here, the analysis notes are organized and shared. I hope it will help everyone understand this vulnerability. The following content mainly explains step by step the execution steps of EXP, and also explains in detail several difficult-to-understand points in the utilization process. 1. Cause of the vulnerability The author's WriteUp has already introduced the code that caused the vulnerability. I will only briefly mention it here and omit most of the source code to reduce the reading burden. In Apache's MPMprefork mode, run the master server with root privileges
    Safety 2272 2023-05-13 09:28:05
  • How to reverse engineer Spotify.app and hook its functions to obtain data
    How to reverse engineer Spotify.app and hook its functions to obtain data
    The goal of this project is to build a Spotify client that can learn my listening habits and skip some songs that I would normally skip. I have to admit, this need comes from my laziness. I don't want to have to create or find playlists when I'm in the mood for something. What I want is to select a song in my library and be able to shuffle other songs and remove songs that don't "flow" from the queue. In order to achieve this, I need to learn some kind of model that can perform this task (maybe more on that in a future post). But in order to be able to train a model, I first need data to train it. Data I need a complete listening history, including those songs I skipped. Get history
    Safety 1294 2023-05-13 08:37:13
  • How to implement Winnti Group new variant analysis
    How to implement Winnti Group new variant analysis
    In February 2020, WinntiGroup’s new modular backdoor PipeMon was discovered. Its main targets are Korean and Taiwanese multiplayer online gaming and video companies, and the malware can launch attacks on the supply chain. Attackers can embed Trojans in published games, or attack game servers, and use game currency to obtain financial benefits. WinntiGroup, which has been active since 2012, targets software industry supply chain attacks. Recently, ESET researchers also discovered attacks targeting several universities in Hong Kong. Technical analysis discovered two variants of PipeMon in targeted companies. The first stage of PipeMon consists of launching a password-protected executable embedded in .rsrc. Launch the program to RAR
    Safety 1318 2023-05-12 22:01:04
  • How to conduct electronic wallet APP vulnerability analysis
    How to conduct electronic wallet APP vulnerability analysis
    Razer Pay is widely used in Singapore and Malaysia. In this Writeup, the author used APP reverse analysis and Frida debugging to discover the user signature (Signature) generation vulnerability in the Razer Pay Ewallet. As a result, the chat history of Razer payment users can be read, the bank account bound to the user can be deleted, and the user's personal sensitive information can be stolen. The vulnerability eventually earned Razer an official reward of nearly $6,000. The following is the author's idea of ​​vulnerability discovery, which can only be used as a reference for posture learning. Vulnerability background Razer Inc (RΛZΞR) is a gaming peripheral equipment company founded in Singapore, also known as the "Green Light Factory".
    Safety 1696 2023-05-12 21:55:10
  • What is the principle of Layer 2 STP?
    What is the principle of Layer 2 STP?
    The ultimate goal of STPSTP: From anywhere in the network, it is the shortest loop-free data forwarding path 1 to the same network as the switch: The first problem faced: Single point of failure Solution: Provide network redundancy/backup 1 Device backup 2 New problems brought by link backup: Layer 2 data forwarding loop New solution: STP/RSTP-spanning-treeprotpocol [Spanning Tree Protocol] highlights another problem: Utilization solution: MSTP [Generate Instance Tree Protocol] has standard protocols: STP-802.1d, slow; RSTP-802.1w, a little faster; MSTP-802.1s can also realize data forwarding while realizing link backup.
    Safety 1540 2023-05-12 21:43:11
  • How to write high-quality and high-performance SQL query statements
    How to write high-quality and high-performance SQL query statements
    1. First, we must understand what an execution plan is? The execution plan is a query plan made by the database based on the SQL statement and the statistical information of the related tables. This plan is automatically analyzed and generated by the query optimizer. For example, if a SQL statement is used to query 1 record from a table with 100,000 records, records, the query optimizer will choose the "index search" method. If the table is archived and there are currently only 5,000 records left, the query optimizer will change the plan and use the "full table scan" method. It can be seen that the execution plan is not fixed, it is "personalized". There are two important points in generating a correct "execution plan": (1) Does the SQL statement clearly tell the query optimizer what it wants to do? (2) The database system obtained by the query optimizer
    Safety 1522 2023-05-12 21:04:12
  • What are the five common vulnerabilities of APIs?
    What are the five common vulnerabilities of APIs?
    API makes it easy to do business, and hackers think so too. Today, when the digital transformation of enterprises is in full swing, APIs have gone far beyond the scope of technology. Both Internet business innovation and the digital transformation of traditional enterprises are inseparable from the API economy or API strategy. APIs connect not only systems and data, but also corporate functional departments, customers and partners, and even the entire business ecosystem. At the same time, with increasingly severe security threats, APIs are becoming the next frontier of network security. We have compiled the top five API security weaknesses and patching suggestions that security experts have given to enterprises. APIs make everything easier, from data sharing to system connectivity to the delivery of critical functionality, but APIs also make it easier for attackers, including malicious bots
    Safety 1412 2023-05-12 20:40:04
  • How to configure the environment for bee-box LDAP injection
    How to configure the environment for bee-box LDAP injection
    1. Overview According to my learning process, I must know what the model and vulnerability of my web attack are. Now I have encountered an unexpected situation. The first time I saw LDAP was during a penetration test in a state-owned enterprise. I found an unpopular one (authorized) and piqued my interest in it. The concept of LDAP: Full name: Lightweight Directory Access Protocol (Lightweight Directory Access Protocol), features: I won’t talk about the protocol, it’s too esoteric, it can be understood as a database for storing data, its special feature is that it is a tree A database in the form of a database. First, the name of the database is equivalent to the root of the tree (i.e. DB=dc), and then the process from the root to a leaf node is
    Safety 1204 2023-05-12 20:37:04

Tool Recommendations

jQuery enterprise message form contact code

jQuery enterprise message form contact code is a simple and practical enterprise message form and contact us introduction page code.
form button
2024-02-29

HTML5 MP3 music box playback effects

HTML5 MP3 music box playback special effect is an mp3 music player based on HTML5 css3 to create cute music box emoticons and click the switch button.

HTML5 cool particle animation navigation menu special effects

HTML5 cool particle animation navigation menu special effect is a special effect that changes color when the navigation menu is hovered by the mouse.
Menu navigation
2024-02-29

jQuery visual form drag and drop editing code

jQuery visual form drag and drop editing code is a visual form based on jQuery and bootstrap framework.
form button
2024-02-29

Organic fruit and vegetable supplier web template Bootstrap5

An organic fruit and vegetable supplier web template-Bootstrap5
Bootstrap template
2023-02-03

Bootstrap3 multifunctional data information background management responsive web page template-Novus

Bootstrap3 multifunctional data information background management responsive web page template-Novus
backend template
2023-02-02

Real estate resource service platform web page template Bootstrap5

Real estate resource service platform web page template Bootstrap5
Bootstrap template
2023-02-02

Simple resume information web template Bootstrap4

Simple resume information web template Bootstrap4
Bootstrap template
2023-02-02

Cute summer elements vector material (EPS PNG)

This is a cute summer element vector material, including the sun, sun hat, coconut tree, bikini, airplane, watermelon, ice cream, ice cream, cold drink, swimming ring, flip-flops, pineapple, conch, shell, starfish, crab, Lemons, sunscreen, sunglasses, etc., the materials are provided in EPS and PNG formats, including JPG previews.
PNG material
2024-05-09

Four red 2023 graduation badges vector material (AI EPS PNG)

This is a red 2023 graduation badge vector material, four in total, available in AI, EPS and PNG formats, including JPG preview.
PNG material
2024-02-29

Singing bird and cart filled with flowers design spring banner vector material (AI EPS)

This is a spring banner vector material designed with singing birds and a cart full of flowers. It is available in AI and EPS formats, including JPG preview.
banner picture
2024-02-29

Golden graduation cap vector material (EPS PNG)

This is a golden graduation cap vector material, available in EPS and PNG formats, including JPG preview.
PNG material
2024-02-27

Home Decor Cleaning and Repair Service Company Website Template

Home Decoration Cleaning and Maintenance Service Company Website Template is a website template download suitable for promotional websites that provide home decoration, cleaning, maintenance and other service organizations. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-05-09

Fresh color personal resume guide page template

Fresh color matching personal job application resume guide page template is a personal job search resume work display guide page web template download suitable for fresh color matching style. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-29

Designer Creative Job Resume Web Template

Designer Creative Job Resume Web Template is a downloadable web template for personal job resume display suitable for various designer positions. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28

Modern engineering construction company website template

The modern engineering and construction company website template is a downloadable website template suitable for promotion of the engineering and construction service industry. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28