Using Ghidra to analyze the back door of phpStudy
Author: lu4nx @ know Chuangyu 404 active defense laboratory
Author blog: Using Ghidra to analyze the back door of phpStudy
Original link: https://paper.seebug.org/1058/
Several days have passed since this incident, and all those who responded have responded. Although many manufacturers and organizations have published analysis articles on ...
Posted by Dimensional on Tue, 22 Oct 2019 04:56:08 -0700
Introduction to python os module
"""
rename file
os.rename(src,dst)
os.rename('123.txt','124.txt')
Delete files
os.remove(path)
os.remove('123.txt')
Create directory
os.mkdir()
Create a multi-level directory
os.makedirs()
Delete directory
os.rmdir()
Delete multi level directory
os.removedirs()
Get current directory
os.getcw ...
Posted by Pilli on Mon, 21 Oct 2019 10:22:53 -0700
Two ways to get started with Python
1. Double bottom method
Definition: double down method is a special method. It is a method with special significance provided by the interpreter. Double down method is mainly used by python source code programmers. We try not to use double down method in development, but in-depth study of double down method is more conducive to reading source c ...
Posted by prakash911 on Mon, 21 Oct 2019 08:38:59 -0700
Data security management: RSA encryption algorithm, detailed explanation of signature verification process
Source code: GitHub point here || GitEE point here
I. Introduction to RSA algorithm
1. Encryption and decryption
RSA encryption is a kind of asymmetric encryption, which is widely used in public key encryption and electronic commerce. The encryption and decryption can be completed without passing the key directly. This can ensure the security ...
Posted by subalan on Sun, 20 Oct 2019 17:43:51 -0700
Data security management: RSA algorithm, signature verification process details
Source code: GitHub point here || GitEE point here
I. Introduction to RSA algorithm
1. Encryption and decryption
RSA encryption is a kind of asymmetric encryption, which is widely used in public key encryption and electronic commerce. The encryption and decryption can be completed without passing the key directly. This can ensure the security ...
Posted by mtombs on Sun, 20 Oct 2019 16:54:05 -0700
python uses database to realize user management.
After learning database, we can use database to make a user management system. Realize the functions of registration, login, view, delete users, etc.Step 1: specifically divided into two parts, the first part is to connect the database, and create a table to encapsulate the table into a class.
The speci ...
Posted by Random on Sun, 20 Oct 2019 11:46:02 -0700
Data preprocessing and exploratory analysis (EBA)
1. Group by a column to determine whether there are duplicate columns.
# Count the unique variables (if we got different weight values,
# for example, then we should get more than one unique value in this groupby)
all_cols_unique_players = df.groupby('playerShort').agg({col:'nunique' for col in player_cols})
For the. agg function:
D ...
Posted by chanchelkumar on Sat, 19 Oct 2019 12:05:05 -0700
New pose of configuration file: configparser
About ConfigParserConfigParser is a package used to read configuration files. The format of the configuration file is as follows: the brackets "[]" contain sections. section below is the configuration similar to key value.
ConfigParser usage:
[db]
db_host = 127.0.0.1
db_port = 69
db_user = root
db_pass = root
hos ...
Posted by finger on Fri, 18 Oct 2019 12:20:43 -0700
. Net TCP exploration - TCP server development (listening to multiple client requests at the same time)
Recently, I read the works written by the great God in the garden.( Interviewer, don't ask me three handshake and four wave again. )Can't help writing a program to test it.
Many examples have been found on the Internet, most of which only implement TCP point-to-point communication, but in practical applications, a server port often listens to m ...
Posted by FeralReason on Fri, 18 Oct 2019 07:44:45 -0700
Climb the treasure net with go language
In the first two sections, we got the city URL and city name. Today we will analyze the user information.
Climb the treasure net with go language for the first time
Climb the treasure net with go language
Crawler algorithm:
To extract the city list in the returned body, we need to use the city list parser;
All users in each city need to be par ...
Posted by kbc1 on Thu, 17 Oct 2019 10:56:34 -0700