Take you to master java deserialization vulnerabilities and their detection

Absrtact: This paper will first introduce the principle of java deserialization vulnerability, and then introduce how security tools detect and scan such vulnerabilities. This article is shared from Huawei cloud community< java deserialization vulnerability and its detection >, author: alpha1e0. 1 Introduction to Java deserialization ...

Posted by DuNuNuBatman on Tue, 19 Oct 2021 18:22:07 -0700

Safety course design experiment

Experiment 1: brute force cracking Specific requirements: break the login point of the specified IP environment. A. IP address can be specified; B. The number of threads required for scanning can be set; C. Analyze the burst result and its principle, and show the corresponding process. 0x01 low difficulty: Log in to dvwa range Reset d ...

Posted by arun4444 on Tue, 12 Oct 2021 11:11:57 -0700