Using Ghidra to analyze the back door of phpStudy

Author: lu4nx @ know Chuangyu 404 active defense laboratory Author blog: Using Ghidra to analyze the back door of phpStudy Original link: https://paper.seebug.org/1058/   Several days have passed since this incident, and all those who responded have responded. Although many manufacturers and organizations have published analysis articles on ...

Posted by Dimensional on Tue, 22 Oct 2019 04:56:08 -0700

Introduction to python os module

""" rename file os.rename(src,dst) os.rename('123.txt','124.txt') Delete files os.remove(path) os.remove('123.txt') Create directory os.mkdir() Create a multi-level directory os.makedirs() Delete directory os.rmdir() Delete multi level directory os.removedirs() Get current directory os.getcw ...

Posted by Pilli on Mon, 21 Oct 2019 10:22:53 -0700

Two ways to get started with Python

1. Double bottom method Definition: double down method is a special method. It is a method with special significance provided by the interpreter. Double down method is mainly used by python source code programmers. We try not to use double down method in development, but in-depth study of double down method is more conducive to reading source c ...

Posted by prakash911 on Mon, 21 Oct 2019 08:38:59 -0700

Data security management: RSA encryption algorithm, detailed explanation of signature verification process

Source code: GitHub point here || GitEE point here I. Introduction to RSA algorithm 1. Encryption and decryption RSA encryption is a kind of asymmetric encryption, which is widely used in public key encryption and electronic commerce. The encryption and decryption can be completed without passing the key directly. This can ensure the security ...

Posted by subalan on Sun, 20 Oct 2019 17:43:51 -0700

Data security management: RSA algorithm, signature verification process details

Source code: GitHub point here || GitEE point here I. Introduction to RSA algorithm 1. Encryption and decryption RSA encryption is a kind of asymmetric encryption, which is widely used in public key encryption and electronic commerce. The encryption and decryption can be completed without passing the key directly. This can ensure the security ...

Posted by mtombs on Sun, 20 Oct 2019 16:54:05 -0700

python uses database to realize user management.

After learning database, we can use database to make a user management system. Realize the functions of registration, login, view, delete users, etc.Step 1: specifically divided into two parts, the first part is to connect the database, and create a table to encapsulate the table into a class. The speci ...

Posted by Random on Sun, 20 Oct 2019 11:46:02 -0700

Data preprocessing and exploratory analysis (EBA)

1. Group by a column to determine whether there are duplicate columns. # Count the unique variables (if we got different weight values, # for example, then we should get more than one unique value in this groupby) all_cols_unique_players = df.groupby('playerShort').agg({col:'nunique' for col in player_cols}) For the. agg function: D ...

Posted by chanchelkumar on Sat, 19 Oct 2019 12:05:05 -0700

New pose of configuration file: configparser

About ConfigParserConfigParser is a package used to read configuration files. The format of the configuration file is as follows: the brackets "[]" contain sections. section below is the configuration similar to key value. ConfigParser usage: [db] db_host = 127.0.0.1 db_port = 69 db_user = root db_pass = root hos ...

Posted by finger on Fri, 18 Oct 2019 12:20:43 -0700

. Net TCP exploration - TCP server development (listening to multiple client requests at the same time)

Recently, I read the works written by the great God in the garden.( Interviewer, don't ask me three handshake and four wave again. )Can't help writing a program to test it. Many examples have been found on the Internet, most of which only implement TCP point-to-point communication, but in practical applications, a server port often listens to m ...

Posted by FeralReason on Fri, 18 Oct 2019 07:44:45 -0700

Climb the treasure net with go language

In the first two sections, we got the city URL and city name. Today we will analyze the user information. Climb the treasure net with go language for the first time Climb the treasure net with go language Crawler algorithm: To extract the city list in the returned body, we need to use the city list parser; All users in each city need to be par ...

Posted by kbc1 on Thu, 17 Oct 2019 10:56:34 -0700