Database security -- a brief analysis of SQLMap source code
directory structure
Let's sort out the directory structure: here is the latest version of sqlmap 1.4.3.12 I downloaded 1. The data directory contains graphical interface templates that can be built, shell back door (the code inside is encrypted), udf rights lifting function, database injection detection load, etc 2.doc directory is the instr ...
Posted by Zmodem on Sun, 31 Oct 2021 03:51:36 -0700
To hacker: you are so awesome, why don't you come and play this CTF
The path of painful penetration
0x00 Preface
The CTF was very sour this time. There were 7 WEB penetration topics, which was also the beginning of pain. Good audit, why add so many high thresholds.
0x01 Pentest-homework-200
http://homework.sctf.xctf.org.cn/
Open the complete page, that is, log in to the registration page. Name, age, uplo ...
Posted by ntjang on Wed, 27 Oct 2021 23:06:31 -0700
[SHA256 of security algorithm] C language source code implementation of SHA256 abstract operation
summary
As we all know, the summary algorithm is also a particularly important existence in the security field, and SHA256 is one of the most common summary algorithms. Its characteristic is that it has low computational complexity. The equal length summary value can be obtained by inputting the original text of unequal length data, which ...
Posted by stuartc1 on Fri, 22 Oct 2021 20:04:40 -0700
On batch mining of src vulnerabilities
preface This blog post only talks about vulnerability utilization and batch mining. Before contacting src, I had the same question with many masters, that is, how did those masters dig holes in batches? After climbing for two months, I gradually have my own understanding and experience, so I intend to share it and communicate with all masters. ...
Posted by LaWr3nCe on Thu, 23 Sep 2021 05:58:29 -0700