Getting started with SpringBoot version of SpringSecurity
SpringSecurity
Safety should be considered at the beginningFunction permissions, access permissions and menu permissions all require certain rules to configure security rules
Remember several classes:
WebSecurityConfigurerAdapter: custom Security policyAuthenticationManagerBuilder: custom authentication policy@Enable WebSecurity: enable WebS ...
Posted by TWD on Tue, 23 Nov 2021 16:04:11 -0800
The programming language uses C language to see the "meteor shower". It is said that making a wish to a meteor will have good luck
The programming language uses C language to see the "meteor shower". It is said that making a wish to a meteor will have good luck
order
No matter how bright a meteor is, it will flash by.
Hi! This is the fox~~
Yes, I'm here again. Last time“ Fireworks ”Have you learned the confession program? This time, I'll gi ...
Posted by robembra on Mon, 22 Nov 2021 22:12:13 -0800
Programming language C / C + +_ wcsupr_ S function - unicode string lowercase to uppercase - Introduction to zero basics of C language
Programming language C / C + +_ wcsupr_ S function - unicode string lowercase to uppercase - Introduction to zero basics of C language
catalogue
I_ wcsupr_ Introduction to s functionII_ wcsupr_s function practice3, Attention problem3, Guess you like it
Zero foundation C/C + + learning route recommendation: C/C + + Learning directory ...
Posted by DapperDanMan on Mon, 22 Nov 2021 22:03:55 -0800
[loophole recurrence] any user at the front desk of Zhimeng CMS modifies the password
1 reproduction environment
PHP 5.6 Decmsv5.7sp2 official version (January 9, 2018)
Reproduction process
According to gourd painting ladle, water a blog. First download the source code of this version, and then unzip it. See the construction process for details This article After the installation, I can't directly access the home page anyway. ...
Posted by imperium2335 on Mon, 22 Nov 2021 21:51:36 -0800
[security vulnerability] rdecms-5.8.1 SSTI template injection leads to RCE
Vulnerability type
SSTI RCE
Utilization conditions
Scope of influence application
Vulnerability overview
On September 30, 2021, Steven Seeley, a foreign security researcher, disclosed an SQL injection vulnerability and an RCE vulnerability caused by SSTI in the latest DedeCMS version. Because the utilization conditions of SQL injection vul ...
Posted by gacon on Sat, 20 Nov 2021 06:57:18 -0800
Practical application of domestic encryption: use SM3 salt to store the password, and use SM2 for login authentication
catalogue
1. Brief
2. Development environment and tools
3. Background password encryption
3.1 encryption code
3.2 SM3 encryption class (Sm3crypto)
3.3 state secret SM3 tools (Sm3Utils)
3.4 dependence package related to state secrets
4. Login authentication
4.1 front end key codes
4.2 key codes of backend login authentication
4.2.1.SM ...
Posted by Liz_SA on Fri, 19 Nov 2021 14:20:10 -0800
[pwnable.kr]Toddler's Bottle-[bof]
Open the topic and review it
Nana told me that buffer overflow is one of the most common software vulnerability.
Is that true?
Download : http://pwnable.kr/bin/bof
Download : http://pwnable.kr/bin/bof.c
Running at : nc pwnable.kr 9000
Nana told me that buffer overflow is one of the most common software vulnerabilities.
Int ...
Posted by ghost007 on Fri, 19 Nov 2021 09:42:53 -0800
Hiding skills of CobaltStrike server
catalogue
Introduction:
1, Modify default port
2, Replace SSL certificate
3, Modify C2.profile file
Create and modify C2 profile file:
4, Run the teamserver file server and go online
Introduction:
Many tools have their own characteristics, such as sqlmap, awvs and other scanners, which can be easily removed by waf ba ...
Posted by shaitan on Wed, 17 Nov 2021 20:52:28 -0800
Actual combat | use Windows API to bypass process protection
Launched in Qianxin attack and Defense Community
Article address: https://forum.butian.net/share/817
preface
Recently, when studying a digital kill software, I saw a configuration option:
img
This self-protection actually loads the 360SelfProtection.sys driver (see the name should also have the 360SelfProtection_win10.sys file), Fengga ...
Posted by KPH71 on Tue, 16 Nov 2021 20:12:39 -0800
Ctfshow web getting started - command execution
web29
The source code is:
<?php
/*
# -*- coding: utf-8 -*-
# @Author: h1xa
# @Date: 2020-09-04 00:12:34
# @Last Modified by: h1xa
# @Last Modified time: 2020-09-04 00:26:48
# @email: h1xa@ctfer.com
# @link: https://ctfer.com
*/
error_reporting(0);
if(isset($_GET['c'])){
$c = $_GET['c'];
if(!preg_match("/flag/i", $c)){
...
Posted by designxperts on Fri, 12 Nov 2021 11:56:51 -0800