Category: Technique

Cookie mechanism

Cookie mechanism in the details

Cookie mechanism In the program, session tracking is a very important thing. In theory, all request operations of a user should belong to the same session, and all the request operations of another user should belong...

Shodan command line

Using Shodan command line

Shodan, the official definition of himself Computer Search Engine (Computer Resource Search Engine), is American man John Mase Li spent nearly 10 years to build a search engine that can search almost all US...

OWASP Top 10 2017

OWASP Top 10 2017 final version has been released!

In recent years, cloud, API, and other technologies widely used, the software development process to introduce agile development and DevOps to achieve the development of operation and maintenance work automation, version of the rapid...

Introduction to Memory Addressing Mode

In the memory addressing principle article, i introduced the basic knowledge of memory addressing , the memory addressing mode to look at IA-32-bit system addressing mode. Article Content 3. IA-32-bit system addressing mode 3.1...

CSRF Simple Example

What are CSRF tokens and how do they work?

Understanding CSRF The Express team’s csrf and csurf modules frequently have issues popping up concerned about our usage of cryptographic functions. These concerns are unwarranted due to a misunderstanding of how CSRF tokens work. So here’s a quick...

Non-Malware (or Fileless) Attack: five knowledge points

Since May this year, WannaCry extortion software in the global outbreak, there have been Equifax experienced large-scale data leakage incidents, etc., the network security situation is very urgent, enterprises in the investment of new...

Kali Linux 2018.2

How to install Kali Linux on Google Cloud

On this post, I am going to guide you how to install & upload your Kali Linux into Google cloud platform. Requirement Google Cloud account number Google Cloud SDK VirtualBox Kali Linux ISO (or VirtualBox...

WebRTC bug

How to use WebRTC to get viewer’s IP address

What is WebRTC? In the conventional video communication, people often need to use a third-party server as a transit, such as B and B want to communicate through the video, then they need to...

Trustico-DigiCert

Install & Enable HTTPS on Apache Server

Install & Enable HTTPS on Apache Server First of all, you need to have a website that can run under http. This tutorial is about Apache2, and other servers may have similar settings. Get a...

Talk about HTML5 local storage

Browser Local Storage Overview Introduction cookie A cookie is a data (usually encrypted) that some websites store on the user’s local terminal in order to identify the user’s identity and track the session. webStorage...

12 ways to download a file from webserver

In our infiltration process, we usually need to send some files to the target host, to achieve the right to maintain, control and other purposes. This article will introduce 12 ways to download files. PowerShell...

IPv6 denial of service attack

Everything need to know about DDOS attack

DDOS attack DOS (denial of service) The purpose of the attack is to make the service normal function unavailable. Unlike other types of attacks aimed at getting sensitive information, Dos attacks do not threaten sensitive...

The difference between GIT and SVN

The main basic differences: 1.GIT is distributed, SVN is not: This is the core difference between GIT and other non-distributed version control systems such as SVN, CVS, and so on. If you can understand this concept,...

The difference between POST & GET in Ajax

Get and Post are sent to the server a request, but the sending mechanism is different. 1. GET request will be passed in the parameter with the URL , while the POST request is sent as an entity...