HackingTeam, a monitoring software development company based in Italy, was hacked recently, and 415GB files were leaked. The data leaked by HackingTeam involves at least...
Preface: This article: the CMS version is 4.2. The following vulnerabilities are included in CNVD. Environment note: PHP version should use 7.0.9. SSRF: According to...
Abstract: After the restart of the maintenance of Dubbo, Ali technology in the open source dynamic, at the China Open Source annual meeting, Alibaba formally...
Blockchain technology is hot recently, most articles are popularizing the concept of blockchain. Blockchain is likely to be the underlying technology for connected applications in...
0x00 Background "green software" usually refers to those small software that can be used without installation. These small software can be used directly after running,...
With the rapid development of big data and artificial intelligence, privacy data leakage and abuse happen from time to time, and privacy security has been...
The pursuit of excellence craftsman spirit, polishing quality code. Full understanding, guided by technical awareness, is the direction of individual learning, team communication and project...
0x00 Background When performing security tests at the Web level, it is unavoidable to perform man-in-the-middle agent to intercept packets for analysis. Common tools include...
On May 16, Ali Cloud Shield attack and defense team learned from external channels that CouchDB database has unauthorized access vulnerability (in the case of...
This range is a very friendly range for new penetrators. Moreover, the range includes the whole process of information collection, vulnerability utilization and permission promotion...
In the development system, it is necessary to have permissions. Currently, the authorization framework in Java has SpringSecurity and Shiro(formerly called JSecurity). For SpringSecurity, the...
Remember the previous interpretation of the authorization process mentioned @ EnableWebSecurity cited WebSecurityConfiguration configuration classes and @ EnableGlobalAuthentication comments? WebSecurityConfiguration...
The development of automobile is regarded as another intelligent terminal after mobile phone. It is undeniable that the change from PC to mobile phone has...
Dark Cloud Memoir is a special feature produced by technology we-media Xianhei Technology. In 2016, the cloud of vulnerability platform was shut down. A year...
This certification course aims to help students understand common network layer threats in a cloud computing environment and be able to capture and analyze network...
Shiro's authorization process is the same as Shiro's authorization process :Shir. Shiro's authorization process is the same as Shiro's authorization process
ERR_UNSAFE_PORT Inaccessible solution due to browser security problems After the WEB HTTPS server is configured, the ERR_UNSAFE_PORT cannot be accessed when the web browser is...