• An attack launched by a network cable

    Not long after I went to college, I met a headache. The rich second generation brought laptops when they first arrived, which made the losers who can only play mobile phones envious and jealous. The deadly thing came. The power supply was cut off at night, and the laptop could still play after the lights were turned off. Unfortunately, we also have one in our bedroom. Always turn off the lights and have to clean the batteries before giving up. While playing games and talking, music is still playing, which is suffering. Although it is easy to change after persuasion, it will recover in a few days. Poor Loser Begins Malicious Ideas In order to change this situation urgently, but read the whole passage
    Author: qxz_xp | Published: March 20, 2015 | Classification: Rookie Entry , Hacker technology , Hacker attack and defense | 5 comments
  • Common methods for finding website background

    1. Tool assisted search Such as Mingxiao, Ah D Wwwscan, etc And some directory tools: Acunetix Web Vulnerability Scanner JSky, IntelliTamper, Netsparker, etc 2. Use of website resources For example, the root directory of the website is Robots.txt text, the image path explodes in the background, check whether the copyright information at the bottom of the website is connected, and query the source code download through the file name in the website. 3. Search engine query There are many kinds of commands, and you can list several commonly used commands: Site: heimian.com context: Tube read the whole passage
    Author: qxz_xp | Published: August 22, 2014 | Classification: Rookie Entry , Hacker attack and defense | 1 comment