Detection
IntroductiontoDNSLet'sbrieflyintroducetheDNSprotocol,whichisanapplicationlayerproto...

Detect syntax injection in MongoDB
NoSQLinjectionNoSQLinjectionisavulnerabilitythatattackerscanusetointerferewiththeappli...

Detailed teaching of XSS attack in web security (Part Two)
prefaceInthepreviousarticle,weintroducedtheReflectiveXSSandDOM-basedXSSattackaswellasthe...

Detailed Explanation of VM Virtual Machine Protection Technology & Analysis of Two CTFvm Reverse Engineering Practical Exercises
AnalysisofVirtualMachineProtectionTechnologyVirtualMachine(VM)Thevirtualmachinesdiscussed...
Detailed explanation of the exploitation of Windows default shares
1.IntroductionIntheWindowssystem,byright-clicking'Manage'on'MyComputer'andthenselecting...

Detailed Explanation of OCMock, a Common Framework for iOS Unit Testing
I.UnitTesting1.1NecessityofUnitTestingTest-drivendevelopmentisnotanewconcept.Indailyd...

Detailed explanation of house of emma exploitation techniques (analysis of 21 Huxiang Cup instances)
00Whyusethismethoddyglibc2.34andabovehavebeencancelledmalloc_hook,aswellasfree_hook,whi...
Detailed analysis of Brute Ratel C4 1.2.2 Badger Shellcode
1.IntroductionTheBruteRatelC4version1.2.2wascrackedandpubliclyleakedontheinternet.Nin...

Design of network asset identification rules
ConceptNetworkassetidentificationrulesarearulefilethatextractsnetworkassetinformationfr...

Design and Practice of Storage Architecture for the Daily Trading of Ten Million Orders
PartOne:OverviewofOrderSystem1.1BusinessScopeServiceBusinessLines:Express,fastlogistics,...