1. Use BurpCrypto for爆破 with parameters of prefix + AES encryption
First,OverviewNowadays,mostwebapplicationsystemsbasicallyusejsencryptionforpasswordsont...
1. The tortuous path of WIFI security
1.ThetortuouspathofWIFIsecurityThecurrentmainstreamwayofWi-Fihackingisgenerallydivide...
1. Starting Point of LDAP Single Sign-On and SAML Single Sign-On
Inthesinglesign-on(SSO)field,themostcommonprotocolsareSAMLandLDAP.Bothprotocolsareu...
1. Send authentication and scheduled task logs (auth, authpriv, cron)
1.OperationobjectivesandapplicationscenariosTofacilitatelogmonitoringandpreventlogtampe...
1. Research and handling of emergency and leadership needs
IntroductionHelloeveryone,thisistheseventharticleintheseries.Pleaserefertothepersonal...
1. PPML: Creating an Efficient and Secure AI Experience
AsofJune30th,theConfidentialComputingSummit2023wassuccessfullyconcludedinSanFrancisco,...
1. Overview of IAST and JD IAST Architecture
1.OverviewofIASTandJDIASTArchitecture1.IASTOverviewIASTitselfisafusiontechnology,inclu...
1. Obtain the directorydata table information of the import table
1.WhatisaPEfilePEfile,shortforPortableExecutablefile,isacommonexecutablefileformat,...
1. How to use Web Cache Vulnerability Scanner to detect web cache poisoning
【GlobalDynamics】1.Russianauthoritiesarrestedtheleaderofaninternationalcybercrimeorganizat...
1. Horizontal splitting of the database, setting different initial values and the same step size
PrefaceInbusinessdevelopment,alargenumberofscenariosrequireuniqueIDsforidentification:u...