current location:Home > Technical Articles > Operation and Maintenance > Safety
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- Introduction to PHP remote code execution vulnerabilities
- This article comes from the server security tutorial column. It introduces the problem of PHP remote code execution vulnerability in detail. It has certain reference value and I hope it can help everyone. The vulnerability is caused by the underflow of env_path_info in the fpm_main.c file in PHP-FPM.
- Safety 3470 2020-04-09 15:35:59
-
- Use the new features of php7 to bypass the anti-killing rules
- This article comes from the web server security column. It introduces how to use the new features of php7 to bypass the anti-killing rules. It has certain reference value and I hope it can help everyone.
- Safety 3431 2020-03-04 10:45:20
-
- Why is the traffic still being hijacked even though I use HTTPS?
- "HTTPS=HTTP+SSL/TLS, this technology can be said to be simple or complex. To put it simply, for the security of network data, it protects traditional Internet HTTP traffic through encrypted transmission." , Dabai told Lao Zhou while drawing pictures.
- Safety 3570 2020-02-22 16:03:52
-
- FTP usage tutorial
- Tutorial on how to use FTP: First download the "FileZilla" software and double-click to run the installation program; then open "File" -> "Site Manager"; then click "New Site" and fill in the host IP and space FTP user name and password; finally, locally Resources Find the file you want to upload and right-click to upload.
- Safety 11755 2020-02-06 10:01:52
-
- Introduction to Linux local kernel privilege escalation vulnerability
- This article comes from the server security tutorial column. It introduces the Linux local kernel privilege escalation vulnerability and reproduces the vulnerability. I hope it can help everyone. An attacker can use the Linux local kernel privilege escalation vulnerability to elevate users with ordinary privileges to root privileges.
- Safety 3546 2020-01-16 17:22:42
-
- PDO principle and correct use method
- This article is recommended by the website security tutorial column. It introduces the principles and correct use of PDO. I hope it can help you. As database parameterized queries become more and more common, SQL injection vulnerabilities have been greatly reduced compared to before. PDO, as the most typical pre-compiled query method in PHP, is used more and more widely.
- Safety 6668 2020-01-11 17:29:47
-
- Five browsers with the best privacy protection
- This article is recommended by the Server Security Tutorial column. It shares with you five browsers with strong privacy protection. I hope it can help you. On any type of device currently, the most installed and used browser is the browser, but not all browsers can help you keep it secret.
- Safety 20215 2020-01-07 17:05:29
-
- Using syntax differences between PHP serialization and deserialization to bypass protection
- Website security tutorial: This article introduces the syntax differences between PHP serialization and deserialization. I hope it can be a reference for everyone. Simply put, serialization is the process of converting objects into strings, while deserialization is the process of restoring strings to objects.
- Safety 2379 2020-01-02 16:53:08
-
- Exploiting CSRF token verification mechanism vulnerability to authenticate victim accounts
- Server Security Tutorial: This article shares a Facebook CSRF vulnerability. There is a CSRF token verification mechanism vulnerability when using a Gmail or G-Suite account to verify a newly created Facebook account. An attacker can use this vulnerability to verify a newly created Facebook account. , used with minimal user interaction
- Safety 3360 2019-12-28 18:02:07
-
- Using Reflected XSS Vulnerability to Hijack Facebook Accounts
- Below, the website security tutorial column will introduce how to use the reflected XSS vulnerability to hijack Facebook accounts. I hope it can be a reference for everyone. The reflected XSS vulnerability is only effective in IE and Edge browsers because some API endpoints do not implement complete and safe escaping measures when processing HTML code responses.
- Safety 3257 2019-12-28 17:59:36
-
- JavaScript prototype chain pollution attack
- This article is recommended by the web server security column. This article tests the JavaScript prototype chain attack and defense through three cases. I hope it can help you. Prototype chain pollution comes from a vulnerability fixed in jQuery, but if this vulnerability is generalized, both the front and back ends will be affected.
- Safety 3757 2019-12-27 17:41:58
-
- Use lexical analysis to extract domain names and IPs
- This article is recommended by the web server security column. It introduces how to extract domain names and IPs through lexical analysis. I hope it can be a reference for everyone. The URL structure in the IP form is the simplest: 4 numbers less than 255 are separated by [.]; the domain form is more complex, but they all have top-level domain names [.com].
- Safety 3612 2019-12-25 13:08:10
-
- Powerful IP rotation and brute force guessing technology
- This article is shared by the web server security column. It introduces how to disable unconfirmed Facebook accounts by using IP rotation and violent guessing methods. I hope it can provide some reference for students in need. The IP rotation method can bypass protection and create an indirect disabling attack on any newly created unconfirmed Facebook user.
- Safety 2490 2019-12-21 11:49:47
-
- Experiment on simple brute force enumeration method to bypass the 2FA verification mechanism of the target system
- This article is recommended by the web server security column. It records an experiment to bypass the 2FA verification mechanism of the target system through brute force enumeration. I hope it can help everyone. For the dynamic password OTP of the target system, by using a simple brute force enumeration method, the target system's two-factor authentication mechanism 2FA can be bypassed or cracked.
- Safety 3897 2019-12-18 11:58:46
-
- AWS S3 bucket misconfiguration - millions of personal information exposed
- This article is introduced by the web server security column: the misconfiguration of AWS S3 buckets causes millions of personal information (PII) to be obtained. I hope it can help you. This article also describes the issue of administrator accounts with login access leading to the leakage of business partner company details.
- Safety 3447 2019-12-16 17:56:34