current location:Home > Technical Articles > Operation and Maintenance > Safety
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- What is the encryption and protection scheme for UE4 programs and resources?
- UnrealEngine4 shell encryption. VirboxProtector solves code disassembly and anti-dump codes, and solves software piracy and algorithm plagiarism. Unreal Engine 4 is a complete game development tool suite produced by game developers for game development. From 2D mobile platform games to console platform masterpieces, Unreal Engine is a pure C++ engine designed for high performance. Its advanced CPU/GPU performance analysis tools and flexible renderer allow developers to efficiently complete high-quality VR experiences. The main code logic of UE4 is located in the EXE and resource file pak in the project. Shensi virboxProtector can protect the code in the exe from being disassembled, while also protecting the pak resources.
- Safety 1106 2023-05-21 18:59:05
-
- How to implement Kali-OpenVAS scanning
- Based on Kali-2019.1a, install OpenVAS and configure (network environment problem, openvas-setup download takes too long) apt-getinstallopenvas#Install openvasopenvas-setup#Initialize configuration openvas-check-setup#Check whether there are problems with openvas settings openvasmd-- list-users#View the current account openvasmd--user=admin--new-password=password#Set the user name and password openvas-start#Start the web management interface on this machine
- Safety 920 2023-05-21 14:13:06
-
- What is the difference between IOS and Android in APP testing?
- 1. First, let’s talk about the key points of APP testing (1) Functional testing. Functional testing is an important aspect in App testing. When conducting App testing, testers should perform manual testing. At the same time, check whether the function is correct and running normally according to the design drawing. In software testing, focus on test points: 1. Whether the software can run, install, and uninstall normally; 2. Login, registration, and logout (introduced in Basics of Software Testing (1), not detailed here) 3. Data update, App Update (2) Client Test Nowadays, many software have not only mobile version but also PC version. The software running on the client PC needs to be compatible with different versions of browsers and can run on mid-range, high-end and low-end PCs. (3) App compatibility test 1. On models of different brands
- Safety 1295 2023-05-21 09:10:10
-
- How to implement Chineseization of Pfsense
- Pfsense Chinese Download Chinese package ClickHere language package ClickHereStep1:UploadpfsenseZH.tgztopfsensesystem/tmp/2:tarzxvf/temp/pfsense.tgz-C/3:Gotopfsensemanagewebsitehttp://PfsenseManageIP/lang.php4:Select Simplified Chinese, then click Browse, choose you Download pfsenseZH.mo, click UPDATE to update 5: Switch the language to Chinese successfully.
- Safety 1204 2023-05-21 08:28:05
-
- How to use sqlmapapi to initiate a scan
- sqlmap can be said to be an artifact of SQL injection detection, but the efficiency of using sqlmap to test SQL injection is very low, and each URL needs to be tested manually. The developers of sqlmap have added sqlmapapi.py, which can be operated directly through interface calls, simplifying the execution of sqlmap commands. sqlmapapi is divided into server and client. sqlmapapi has two modes, one is the interface mode based on HTTP protocol, and the other is the interface mode based on command line. sqlmap source code download address: https://github.com/sqlmapproject/sqlmap/ 1. View help pythonsqlmapa
- Safety 1187 2023-05-20 23:13:43
-
- How to analyze the writeup of CTF questions
- This is a relatively simple PWN question. First, drag it into IDA and briefly look at the program. As shown in the figure, it is found that it is reading and there is no stack protection. Therefore, when reading 0x34, the game return address may be replaced. First, pass write(1, write,4) (game as write return address). Read the write address in this way, so that you can get the system address, because it is running in a loop again. Also write /bin/sh\0 at 0x804A06C, so that the system can run. Pythonexp is as follows: frompwnimport*defrungameAgainPoc(p,yourname,flag):p.re
- Safety 1037 2023-05-20 20:19:04
-
- How to reproduce the EyouCMS V1.5.1 front-end getshell vulnerability
- Introduction to 0x00 vulnerability Zanzan Network Technology EyouCMS (EyouCMS) is an open source content management system (CMS) based on ThinkPHP of China Zanzan Network Technology Company. Eyoucmsv1.5.1 and previous versions have arbitrary user background login and file inclusion vulnerabilities. This vulnerability allows an attacker to set an administrator's session in the foreground by calling the API, and the background remote plug-in download file contains getshell. 0x01 affected version EyouCMS
- Safety 3376 2023-05-20 20:14:40
-
- How to implement manual SQL injection
- SQL injection is one of the common methods used by *** to attack the database. Its core idea is: *** constructs a database query code after the normal URL that needs to call the database data, and then based on the returned results, obtain Some data you want. Next, we will perform SQL injection on the *** platform that has been built before. The ultimate goal is to obtain the administrator account and password of the website. Target server IP address: 192.168.80.129, *** host IP address: 192.168.80.128. (1) Find the injection point, open a web page at random, and pay attention to the URL. The injection point must be something like "http://192.168.80.129/shownews
- Safety 2640 2023-05-20 19:13:30
-
- How to deploy Django
- PART1. Safety First The best time to fix vulnerabilities is during development. 1.1CSRFTOKENCSRFTOKEN is a very important security measure in the Django security system. However, in many cases, some students who have just come into contact with Django will find that the form they finally wrote will report an error during POST. After some searches, they find that it is a CSRFTOKEN problem, and then follow the online method to divide the settings by three and five. All CSRFTOKEN configurations in .py were removed and the code ran normally. Familiar people don’t know that this kind of operation will greatly affect the security of the website and increase the cost of patching vulnerabilities in the later stage; eliminating security problems in the development stage is the cost
- Safety 2055 2023-05-20 17:26:19
-
- How to write a database mining script
- 01.Code1#! The first line of the/bin/sh script looks like a line of comments, but it is not. It specifies which SHELL will be used to execute the next script. The bash, zsh, etc. we usually use are a superset of sh. This script uses sh as the execution shell, which has better portability. 02.Code2setenforce02>dev/nullechoSELINUX=disabled>/etc/sysconfig/selinux2>/dev/nullsetenforce is the Linux selinux firewall configuration command, execute sete
- Safety 2492 2023-05-20 17:02:18
-
- What is the reverse analysis and protection mechanism of Android APP?
- Want to know the common protection methods for Android Apps and their corresponding reverse analysis methods? Android APP security includes a lot of content. This time we share obfuscated code, overall Dex reinforcement, split Dex reinforcement, virtual machine reinforcement, etc. In fact, these contents are also a major trend in Android App security protection in China in recent years. 1. Obfuscated code Java code is very easy to decompile. As a cross-platform, interpreted language, Java source code is compiled into intermediate "bytecode" and stored in class files. Due to cross-platform requirements, these bytecodes carry a lot of semantic information and can be easily decompiled into Java source code. In order to protect Java source code well, developers often compile
- Safety 1631 2023-05-20 16:20:35
-
- How to implement virtual machine NAT mode to access the Internet
- When using a vmware virtual machine to learn Linux, the common problem encountered is that the host machine cannot communicate normally and the virtual machine cannot access the Internet normally. Here is a detailed configuration for easy reference later. After installing the vmware software, you must have the NAT mode to use Virtual network card VMnet8, here we take win10 as an example to return to the virtual machine settings: To use NAT mode, the vmnet8 network card here must be connected and used. Both gray ticks must be checked. Here you only need to confirm whether NAT mode is enabled. Then the network configuration of Linux is as follows: [root@zabbix~]#cat/etc/sysconfig/network-scripts/ifcf
- Safety 1812 2023-05-20 15:22:12
-
- How to Conduct Authorized APK Penetration Testing
- As a penetration testing novice, the purpose of this article is to provide some testing ideas for those novices like me. The content involved may be relatively basic, cousins, please forgive me. After unpacking the APK and getting the apk, use 7-Zip to unzip it directly to get several folders, an AndroidManifest.xml file, and a dex file. Use dex2jar https://sourceforge.net/projects/dex2jar/ to decompress this dex file to generate a jar file, and then use jd-gui to view the java source code. Of course, you can find loopholes in the code from the source code, but there is usually confusion, so we won’t discuss it in depth here.
- Safety 2043 2023-05-20 12:29:00
-
- What are the classifications of IP addresses?
- Introduction to IP addresses: Any device that can access the Internet must have an IP address; and each IP address is equivalent to everyone must have a name; common IP addresses look like, such as the default of TP-Link wireless routing Address: 192.168.1.1 Configure the IP address of your own network card: 192.168.1.2255.255.255.0 Note: The IP address must appear in pairs with the subnet mask, otherwise it is meaningless; check the IP address configuration of your own network card: 1. Graphically Interface (click through the mouse) - that is, win system 2. Through the command line #Open the run, enter cmd, call the "command line window"; #Enter the command: ipconfig//display network
- Safety 2373 2023-05-20 11:34:06
-
- Clear Windows computer traces
- (1) Clear recently opened files in File Explorer, click the small arrow in the upper right corner, click the View menu, and select Clear under General (2) Disk wipe using the system's own tool cipher. How to use: Open cipher w/:C from the command line, where c For disk, it can be changed to D or E
- Safety 2135 2023-05-20 10:40:05