current location:Home > Technical Articles > Operation and Maintenance > Safety

  • Introduction to PHP remote code execution vulnerabilities
    Introduction to PHP remote code execution vulnerabilities
    This article comes from the server security tutorial column. It introduces the problem of PHP remote code execution vulnerability in detail. It has certain reference value and I hope it can help everyone. The vulnerability is caused by the underflow of env_path_info in the fpm_main.c file in PHP-FPM.
    Safety 3470 2020-04-09 15:35:59
  • Use the new features of php7 to bypass the anti-killing rules
    Use the new features of php7 to bypass the anti-killing rules
    This article comes from the web server security column. It introduces how to use the new features of php7 to bypass the anti-killing rules. It has certain reference value and I hope it can help everyone.
    Safety 3431 2020-03-04 10:45:20
  • Why is the traffic still being hijacked even though I use HTTPS?
    Why is the traffic still being hijacked even though I use HTTPS?
    "HTTPS=HTTP+SSL/TLS, this technology can be said to be simple or complex. To put it simply, for the security of network data, it protects traditional Internet HTTP traffic through encrypted transmission." , Dabai told Lao Zhou while drawing pictures.
    Safety 3570 2020-02-22 16:03:52
  • FTP usage tutorial
    FTP usage tutorial
    Tutorial on how to use FTP: First download the "FileZilla" software and double-click to run the installation program; then open "File" -> "Site Manager"; then click "New Site" and fill in the host IP and space FTP user name and password; finally, locally Resources Find the file you want to upload and right-click to upload.
    Safety 11755 2020-02-06 10:01:52
  • Introduction to Linux local kernel privilege escalation vulnerability
    Introduction to Linux local kernel privilege escalation vulnerability
    This article comes from the server security tutorial column. It introduces the Linux local kernel privilege escalation vulnerability and reproduces the vulnerability. I hope it can help everyone. An attacker can use the Linux local kernel privilege escalation vulnerability to elevate users with ordinary privileges to root privileges.
    Safety 3546 2020-01-16 17:22:42
  • PDO principle and correct use method
    PDO principle and correct use method
    This article is recommended by the website security tutorial column. It introduces the principles and correct use of PDO. I hope it can help you. As database parameterized queries become more and more common, SQL injection vulnerabilities have been greatly reduced compared to before. PDO, as the most typical pre-compiled query method in PHP, is used more and more widely.
    Safety 6668 2020-01-11 17:29:47
  • Five browsers with the best privacy protection
    Five browsers with the best privacy protection
    This article is recommended by the Server Security Tutorial column. It shares with you five browsers with strong privacy protection. I hope it can help you. On any type of device currently, the most installed and used browser is the browser, but not all browsers can help you keep it secret.
    Safety 20215 2020-01-07 17:05:29
  • Using syntax differences between PHP serialization and deserialization to bypass protection
    Using syntax differences between PHP serialization and deserialization to bypass protection
    Website security tutorial: This article introduces the syntax differences between PHP serialization and deserialization. I hope it can be a reference for everyone. Simply put, serialization is the process of converting objects into strings, while deserialization is the process of restoring strings to objects.
    Safety 2379 2020-01-02 16:53:08
  • Exploiting CSRF token verification mechanism vulnerability to authenticate victim accounts
    Exploiting CSRF token verification mechanism vulnerability to authenticate victim accounts
    Server Security Tutorial: This article shares a Facebook CSRF vulnerability. There is a CSRF token verification mechanism vulnerability when using a Gmail or G-Suite account to verify a newly created Facebook account. An attacker can use this vulnerability to verify a newly created Facebook account. , used with minimal user interaction
    Safety 3360 2019-12-28 18:02:07
  • Using Reflected XSS Vulnerability to Hijack Facebook Accounts
    Using Reflected XSS Vulnerability to Hijack Facebook Accounts
    Below, the website security tutorial column will introduce how to use the reflected XSS vulnerability to hijack Facebook accounts. I hope it can be a reference for everyone. The reflected XSS vulnerability is only effective in IE and Edge browsers because some API endpoints do not implement complete and safe escaping measures when processing HTML code responses.
    Safety 3257 2019-12-28 17:59:36
  • JavaScript prototype chain pollution attack
    JavaScript prototype chain pollution attack
    This article is recommended by the web server security column. This article tests the JavaScript prototype chain attack and defense through three cases. I hope it can help you. Prototype chain pollution comes from a vulnerability fixed in jQuery, but if this vulnerability is generalized, both the front and back ends will be affected.
    Safety 3757 2019-12-27 17:41:58
  • Use lexical analysis to extract domain names and IPs
    Use lexical analysis to extract domain names and IPs
    This article is recommended by the web server security column. It introduces how to extract domain names and IPs through lexical analysis. I hope it can be a reference for everyone. The URL structure in the IP form is the simplest: 4 numbers less than 255 are separated by [.]; the domain form is more complex, but they all have top-level domain names [.com].
    Safety 3612 2019-12-25 13:08:10
  • Powerful IP rotation and brute force guessing technology
    Powerful IP rotation and brute force guessing technology
    This article is shared by the web server security column. It introduces how to disable unconfirmed Facebook accounts by using IP rotation and violent guessing methods. I hope it can provide some reference for students in need. The IP rotation method can bypass protection and create an indirect disabling attack on any newly created unconfirmed Facebook user.
    Safety 2490 2019-12-21 11:49:47
  • Experiment on simple brute force enumeration method to bypass the 2FA verification mechanism of the target system
    Experiment on simple brute force enumeration method to bypass the 2FA verification mechanism of the target system
    This article is recommended by the web server security column. It records an experiment to bypass the 2FA verification mechanism of the target system through brute force enumeration. I hope it can help everyone. For the dynamic password OTP of the target system, by using a simple brute force enumeration method, the target system's two-factor authentication mechanism 2FA can be bypassed or cracked.
    Safety 3897 2019-12-18 11:58:46
  • AWS S3 bucket misconfiguration - millions of personal information exposed
    AWS S3 bucket misconfiguration - millions of personal information exposed
    This article is introduced by the web server security column: the misconfiguration of AWS S3 buckets causes millions of personal information (PII) to be obtained. I hope it can help you. This article also describes the issue of administrator accounts with login access leading to the leakage of business partner company details.
    Safety 3447 2019-12-16 17:56:34

Tool Recommendations

jQuery enterprise message form contact code

jQuery enterprise message form contact code is a simple and practical enterprise message form and contact us introduction page code.
form button
2024-02-29

HTML5 MP3 music box playback effects

HTML5 MP3 music box playback special effect is an mp3 music player based on HTML5 css3 to create cute music box emoticons and click the switch button.

HTML5 cool particle animation navigation menu special effects

HTML5 cool particle animation navigation menu special effect is a special effect that changes color when the navigation menu is hovered by the mouse.
Menu navigation
2024-02-29

jQuery visual form drag and drop editing code

jQuery visual form drag and drop editing code is a visual form based on jQuery and bootstrap framework.
form button
2024-02-29

Organic fruit and vegetable supplier web template Bootstrap5

An organic fruit and vegetable supplier web template-Bootstrap5
Bootstrap template
2023-02-03

Bootstrap3 multifunctional data information background management responsive web page template-Novus

Bootstrap3 multifunctional data information background management responsive web page template-Novus
backend template
2023-02-02

Real estate resource service platform web page template Bootstrap5

Real estate resource service platform web page template Bootstrap5
Bootstrap template
2023-02-02

Simple resume information web template Bootstrap4

Simple resume information web template Bootstrap4
Bootstrap template
2023-02-02

Cute summer elements vector material (EPS PNG)

This is a cute summer element vector material, including the sun, sun hat, coconut tree, bikini, airplane, watermelon, ice cream, ice cream, cold drink, swimming ring, flip-flops, pineapple, conch, shell, starfish, crab, Lemons, sunscreen, sunglasses, etc., the materials are provided in EPS and PNG formats, including JPG previews.
PNG material
2024-05-09

Four red 2023 graduation badges vector material (AI EPS PNG)

This is a red 2023 graduation badge vector material, four in total, available in AI, EPS and PNG formats, including JPG preview.
PNG material
2024-02-29

Singing bird and cart filled with flowers design spring banner vector material (AI EPS)

This is a spring banner vector material designed with singing birds and a cart full of flowers. It is available in AI and EPS formats, including JPG preview.
banner picture
2024-02-29

Golden graduation cap vector material (EPS PNG)

This is a golden graduation cap vector material, available in EPS and PNG formats, including JPG preview.
PNG material
2024-02-27

Home Decor Cleaning and Repair Service Company Website Template

Home Decoration Cleaning and Maintenance Service Company Website Template is a website template download suitable for promotional websites that provide home decoration, cleaning, maintenance and other service organizations. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-05-09

Fresh color personal resume guide page template

Fresh color matching personal job application resume guide page template is a personal job search resume work display guide page web template download suitable for fresh color matching style. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-29

Designer Creative Job Resume Web Template

Designer Creative Job Resume Web Template is a downloadable web template for personal job resume display suitable for various designer positions. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28

Modern engineering construction company website template

The modern engineering and construction company website template is a downloadable website template suitable for promotion of the engineering and construction service industry. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28