current location:Home > Technical Articles > Operation and Maintenance > Safety

  • What is the encryption and protection scheme for UE4 programs and resources?
    What is the encryption and protection scheme for UE4 programs and resources?
    UnrealEngine4 shell encryption. VirboxProtector solves code disassembly and anti-dump codes, and solves software piracy and algorithm plagiarism. Unreal Engine 4 is a complete game development tool suite produced by game developers for game development. From 2D mobile platform games to console platform masterpieces, Unreal Engine is a pure C++ engine designed for high performance. Its advanced CPU/GPU performance analysis tools and flexible renderer allow developers to efficiently complete high-quality VR experiences. The main code logic of UE4 is located in the EXE and resource file pak in the project. Shensi virboxProtector can protect the code in the exe from being disassembled, while also protecting the pak resources.
    Safety 1106 2023-05-21 18:59:05
  • How to implement Kali-OpenVAS scanning
    How to implement Kali-OpenVAS scanning
    Based on Kali-2019.1a, install OpenVAS and configure (network environment problem, openvas-setup download takes too long) apt-getinstallopenvas#Install openvasopenvas-setup#Initialize configuration openvas-check-setup#Check whether there are problems with openvas settings openvasmd-- list-users#View the current account openvasmd--user=admin--new-password=password#Set the user name and password openvas-start#Start the web management interface on this machine
    Safety 920 2023-05-21 14:13:06
  • What is the difference between IOS and Android in APP testing?
    What is the difference between IOS and Android in APP testing?
    1. First, let’s talk about the key points of APP testing (1) Functional testing. Functional testing is an important aspect in App testing. When conducting App testing, testers should perform manual testing. At the same time, check whether the function is correct and running normally according to the design drawing. In software testing, focus on test points: 1. Whether the software can run, install, and uninstall normally; 2. Login, registration, and logout (introduced in Basics of Software Testing (1), not detailed here) 3. Data update, App Update (2) Client Test Nowadays, many software have not only mobile version but also PC version. The software running on the client PC needs to be compatible with different versions of browsers and can run on mid-range, high-end and low-end PCs. (3) App compatibility test 1. On models of different brands
    Safety 1295 2023-05-21 09:10:10
  • How to implement Chineseization of Pfsense
    How to implement Chineseization of Pfsense
    Pfsense Chinese Download Chinese package ClickHere language package ClickHereStep1:UploadpfsenseZH.tgztopfsensesystem/tmp/2:tarzxvf/temp/pfsense.tgz-C/3:Gotopfsensemanagewebsitehttp://PfsenseManageIP/lang.php4:Select Simplified Chinese, then click Browse, choose you Download pfsenseZH.mo, click UPDATE to update 5: Switch the language to Chinese successfully.
    Safety 1204 2023-05-21 08:28:05
  • How to use sqlmapapi to initiate a scan
    How to use sqlmapapi to initiate a scan
    sqlmap can be said to be an artifact of SQL injection detection, but the efficiency of using sqlmap to test SQL injection is very low, and each URL needs to be tested manually. The developers of sqlmap have added sqlmapapi.py, which can be operated directly through interface calls, simplifying the execution of sqlmap commands. sqlmapapi is divided into server and client. sqlmapapi has two modes, one is the interface mode based on HTTP protocol, and the other is the interface mode based on command line. sqlmap source code download address: https://github.com/sqlmapproject/sqlmap/ 1. View help pythonsqlmapa
    Safety 1187 2023-05-20 23:13:43
  • How to analyze the writeup of CTF questions
    How to analyze the writeup of CTF questions
    This is a relatively simple PWN question. First, drag it into IDA and briefly look at the program. As shown in the figure, it is found that it is reading and there is no stack protection. Therefore, when reading 0x34, the game return address may be replaced. First, pass write(1, write,4) (game as write return address). Read the write address in this way, so that you can get the system address, because it is running in a loop again. Also write /bin/sh\0 at 0x804A06C, so that the system can run. Pythonexp is as follows: frompwnimport*defrungameAgainPoc(p,yourname,flag):p.re
    Safety 1037 2023-05-20 20:19:04
  • How to reproduce the EyouCMS V1.5.1 front-end getshell vulnerability
    How to reproduce the EyouCMS V1.5.1 front-end getshell vulnerability
    Introduction to 0x00 vulnerability Zanzan Network Technology EyouCMS (EyouCMS) is an open source content management system (CMS) based on ThinkPHP of China Zanzan Network Technology Company. Eyoucmsv1.5.1 and previous versions have arbitrary user background login and file inclusion vulnerabilities. This vulnerability allows an attacker to set an administrator's session in the foreground by calling the API, and the background remote plug-in download file contains getshell. 0x01 affected version EyouCMS
    Safety 3376 2023-05-20 20:14:40
  • How to implement manual SQL injection
    How to implement manual SQL injection
    SQL injection is one of the common methods used by *** to attack the database. Its core idea is: *** constructs a database query code after the normal URL that needs to call the database data, and then based on the returned results, obtain Some data you want. Next, we will perform SQL injection on the *** platform that has been built before. The ultimate goal is to obtain the administrator account and password of the website. Target server IP address: 192.168.80.129, *** host IP address: 192.168.80.128. (1) Find the injection point, open a web page at random, and pay attention to the URL. The injection point must be something like "http://192.168.80.129/shownews
    Safety 2640 2023-05-20 19:13:30
  • How to deploy Django
    How to deploy Django
    PART1. Safety First The best time to fix vulnerabilities is during development. 1.1CSRFTOKENCSRFTOKEN is a very important security measure in the Django security system. However, in many cases, some students who have just come into contact with Django will find that the form they finally wrote will report an error during POST. After some searches, they find that it is a CSRFTOKEN problem, and then follow the online method to divide the settings by three and five. All CSRFTOKEN configurations in .py were removed and the code ran normally. Familiar people don’t know that this kind of operation will greatly affect the security of the website and increase the cost of patching vulnerabilities in the later stage; eliminating security problems in the development stage is the cost
    Safety 2055 2023-05-20 17:26:19
  • How to write a database mining script
    How to write a database mining script
    01.Code1#! The first line of the/bin/sh script looks like a line of comments, but it is not. It specifies which SHELL will be used to execute the next script. The bash, zsh, etc. we usually use are a superset of sh. This script uses sh as the execution shell, which has better portability. 02.Code2setenforce02>dev/nullechoSELINUX=disabled>/etc/sysconfig/selinux2>/dev/nullsetenforce is the Linux selinux firewall configuration command, execute sete
    Safety 2492 2023-05-20 17:02:18
  • What is the reverse analysis and protection mechanism of Android APP?
    What is the reverse analysis and protection mechanism of Android APP?
    Want to know the common protection methods for Android Apps and their corresponding reverse analysis methods? Android APP security includes a lot of content. This time we share obfuscated code, overall Dex reinforcement, split Dex reinforcement, virtual machine reinforcement, etc. In fact, these contents are also a major trend in Android App security protection in China in recent years. 1. Obfuscated code Java code is very easy to decompile. As a cross-platform, interpreted language, Java source code is compiled into intermediate "bytecode" and stored in class files. Due to cross-platform requirements, these bytecodes carry a lot of semantic information and can be easily decompiled into Java source code. In order to protect Java source code well, developers often compile
    Safety 1631 2023-05-20 16:20:35
  • How to implement virtual machine NAT mode to access the Internet
    How to implement virtual machine NAT mode to access the Internet
    When using a vmware virtual machine to learn Linux, the common problem encountered is that the host machine cannot communicate normally and the virtual machine cannot access the Internet normally. Here is a detailed configuration for easy reference later. After installing the vmware software, you must have the NAT mode to use Virtual network card VMnet8, here we take win10 as an example to return to the virtual machine settings: To use NAT mode, the vmnet8 network card here must be connected and used. Both gray ticks must be checked. Here you only need to confirm whether NAT mode is enabled. Then the network configuration of Linux is as follows: [root@zabbix~]#cat/etc/sysconfig/network-scripts/ifcf
    Safety 1812 2023-05-20 15:22:12
  • How to Conduct Authorized APK Penetration Testing
    How to Conduct Authorized APK Penetration Testing
    As a penetration testing novice, the purpose of this article is to provide some testing ideas for those novices like me. The content involved may be relatively basic, cousins, please forgive me. After unpacking the APK and getting the apk, use 7-Zip to unzip it directly to get several folders, an AndroidManifest.xml file, and a dex file. Use dex2jar https://sourceforge.net/projects/dex2jar/ to decompress this dex file to generate a jar file, and then use jd-gui to view the java source code. Of course, you can find loopholes in the code from the source code, but there is usually confusion, so we won’t discuss it in depth here.
    Safety 2043 2023-05-20 12:29:00
  • What are the classifications of IP addresses?
    What are the classifications of IP addresses?
    Introduction to IP addresses: Any device that can access the Internet must have an IP address; and each IP address is equivalent to everyone must have a name; common IP addresses look like, such as the default of TP-Link wireless routing Address: 192.168.1.1 Configure the IP address of your own network card: 192.168.1.2255.255.255.0 Note: The IP address must appear in pairs with the subnet mask, otherwise it is meaningless; check the IP address configuration of your own network card: 1. Graphically Interface (click through the mouse) - that is, win system 2. Through the command line #Open the run, enter cmd, call the "command line window"; #Enter the command: ipconfig//display network
    Safety 2373 2023-05-20 11:34:06
  • Clear Windows computer traces
    Clear Windows computer traces
    (1) Clear recently opened files in File Explorer, click the small arrow in the upper right corner, click the View menu, and select Clear under General (2) Disk wipe using the system's own tool cipher. How to use: Open cipher w/:C from the command line, where c For disk, it can be changed to D or E
    Safety 2135 2023-05-20 10:40:05

Tool Recommendations

jQuery enterprise message form contact code

jQuery enterprise message form contact code is a simple and practical enterprise message form and contact us introduction page code.
form button
2024-02-29

HTML5 MP3 music box playback effects

HTML5 MP3 music box playback special effect is an mp3 music player based on HTML5 css3 to create cute music box emoticons and click the switch button.

HTML5 cool particle animation navigation menu special effects

HTML5 cool particle animation navigation menu special effect is a special effect that changes color when the navigation menu is hovered by the mouse.
Menu navigation
2024-02-29

jQuery visual form drag and drop editing code

jQuery visual form drag and drop editing code is a visual form based on jQuery and bootstrap framework.
form button
2024-02-29

Organic fruit and vegetable supplier web template Bootstrap5

An organic fruit and vegetable supplier web template-Bootstrap5
Bootstrap template
2023-02-03

Bootstrap3 multifunctional data information background management responsive web page template-Novus

Bootstrap3 multifunctional data information background management responsive web page template-Novus
backend template
2023-02-02

Real estate resource service platform web page template Bootstrap5

Real estate resource service platform web page template Bootstrap5
Bootstrap template
2023-02-02

Simple resume information web template Bootstrap4

Simple resume information web template Bootstrap4
Bootstrap template
2023-02-02

Cute summer elements vector material (EPS PNG)

This is a cute summer element vector material, including the sun, sun hat, coconut tree, bikini, airplane, watermelon, ice cream, ice cream, cold drink, swimming ring, flip-flops, pineapple, conch, shell, starfish, crab, Lemons, sunscreen, sunglasses, etc., the materials are provided in EPS and PNG formats, including JPG previews.
PNG material
2024-05-09

Four red 2023 graduation badges vector material (AI EPS PNG)

This is a red 2023 graduation badge vector material, four in total, available in AI, EPS and PNG formats, including JPG preview.
PNG material
2024-02-29

Singing bird and cart filled with flowers design spring banner vector material (AI EPS)

This is a spring banner vector material designed with singing birds and a cart full of flowers. It is available in AI and EPS formats, including JPG preview.
banner picture
2024-02-29

Golden graduation cap vector material (EPS PNG)

This is a golden graduation cap vector material, available in EPS and PNG formats, including JPG preview.
PNG material
2024-02-27

Home Decor Cleaning and Repair Service Company Website Template

Home Decoration Cleaning and Maintenance Service Company Website Template is a website template download suitable for promotional websites that provide home decoration, cleaning, maintenance and other service organizations. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-05-09

Fresh color personal resume guide page template

Fresh color matching personal job application resume guide page template is a personal job search resume work display guide page web template download suitable for fresh color matching style. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-29

Designer Creative Job Resume Web Template

Designer Creative Job Resume Web Template is a downloadable web template for personal job resume display suitable for various designer positions. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28

Modern engineering construction company website template

The modern engineering and construction company website template is a downloadable website template suitable for promotion of the engineering and construction service industry. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28