search

Using syntax differences between PHP serialization and deserialization to bypass protection

Release:2020-01-02 16:53:08
Using syntax differences between PHP serialization and deserialization to bypass protection

Exploiting CSRF token verification mechanism vulnerability to authenticate victim accounts

Release:2019-12-28 18:02:07
Exploiting CSRF token verification mechanism vulnerability to authenticate victim accounts

Using Reflected XSS Vulnerability to Hijack Facebook Accounts

Release:2019-12-28 17:59:36
Using Reflected XSS Vulnerability to Hijack Facebook Accounts

JavaScript prototype chain pollution attack

Release:2019-12-27 17:41:58
JavaScript prototype chain pollution attack

Use lexical analysis to extract domain names and IPs

Release:2019-12-25 13:08:10
Use lexical analysis to extract domain names and IPs

Powerful IP rotation and brute force guessing technology

Release:2019-12-21 11:49:47
Powerful IP rotation and brute force guessing technology

Experiment on simple brute force enumeration method to bypass the 2FA verification mechanism of the target system

Release:2019-12-18 11:58:46
Experiment on simple brute force enumeration method to bypass the 2FA verification mechanism of the target system

AWS S3 bucket misconfiguration - millions of personal information exposed

Release:2019-12-16 17:56:34
AWS S3 bucket misconfiguration - millions of personal information exposed

In-depth analysis of JavaScript-based DDOS attacks

Release:2019-12-10 17:34:56
In-depth analysis of JavaScript-based DDOS attacks

Detailed explanation of some problems encountered in developing passive scanner plug-ins

Release:2019-12-09 13:38:17
Detailed explanation of some problems encountered in developing passive scanner plug-ins

Obtain target user's local private key information through stored XSS vulnerability

Release:2019-12-04 17:40:28
Obtain target user's local private key information through stored XSS vulnerability

Practical attack and defense of one-time stored XSS

Release:2019-12-03 17:42:52
Practical attack and defense of one-time stored XSS

Summary of common unauthorized access vulnerabilities

Release:2019-12-02 17:40:44
Summary of common unauthorized access vulnerabilities

Analysis of the principle of remote code execution vulnerability caused by java deserialization

Release:2019-11-30 17:50:38
Analysis of the principle of remote code execution vulnerability caused by java deserialization

XSS attack principles and protection

Release:2019-11-30 14:27:07
XSS attack principles and protection