自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(7)
  • 收藏
  • 关注

原创 php object inject

解释: http://securitycafe.ro/2015/01/05/understanding-php-object-injection/owasp:https://www.owasp.org/index.php/PHP_Object_Injection

2015-05-29 00:45:40 221

原创 [转]nmap cheatsheet

[url]https://scadahacker.com/library/Documents/Cheat_Sheets/Hacking%20-%20NMap%20Quick%20Reference%20Guide.pdf[/url]

2015-05-27 00:10:28 134

原创 rails g scaffold Error

rails g scaffold[color=darkblue]Error: root/.rbenv/versions/2.2.2/lib/ruby/gems/2.2.0/gems/bundler-1.9.8/lib/bundler/runtime.rb:34:in `block in setup': You have already activated spring 1.3.6, but...

2015-05-19 21:03:31 101

原创 [转]Playing with Content-Type – XXE on JSON Endpoints

原文地址:Many web and mobile applications rely on web services communication for client-server interaction. Most common data formats for web services are XML, whether SOAP or RESTful, and JSON. While ...

2015-05-19 01:17:35 109

原创 [转]Forcing XXE Reflection through Server Error Messages

原文地址:[url]https://blog.netspi.com/forcing-xxe-reflection-server-error-messages/[/url]XML External Entity (XXE) injection attacks are a simple way to extract files from a remote server via web reques...

2015-05-19 01:10:22 124

原创 [转]malware persistence

原文地址:[url]http://jumpespjump.blogspot.com/2015/05/many-ways-of-malware-persistence-that.html[/url][color=blue][b][b]1. Autoruns[/b][/b][/color]My favorite choice when it comes to malware persist...

2015-05-06 23:46:57 413

原创 [转]backdoor a windows domain

[b]原文地址:[url]http://jumpespjump.blogspot.com/2015/03/thousand-ways-to-backdoor-windows.html[/url][/b]When the Kerberos elevation of privilege (CVE-2014-6324 / MS14-068) vulnerability has been made...

2015-05-06 22:56:59 142

空空如也

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除