• 360 Exploding Xiaomi Mobile Phone Has Remote Code Execution Vulnerability

    On September 25, 360 Technology Blog revealed that the MIUI system used by Xiaomi has a very obvious security vulnerability, through which the permissions of mobile APP can be obtained remotely. Song Shenlei (eggplant), a senior security expert of 360, revealed that after discovering the vulnerability in July, he had immediately notified the Xiaomi Security Response Center. At present, the vulnerability has been repaired in the latest version of MIUI. The research found that the original browser of Xiaomi MIUI has intention protocol (intention is Intent, which is a runtime binding mechanism, and it can connect two different read the whole passage
    Author: qxz_xp | Published: August 26, 2014 | Classification: Industry News , Hacker attack and defense | No comment
  • Common methods for finding website background

    1. Tool assisted search Such as Mingxiao, Ah D Wwwscan, etc And some directory tools: Acunetix Web Vulnerability Scanner JSky, IntelliTamper, Netsparker, etc 2. Use of website resources For example, the root directory of the website is Robots.txt text, the image path explodes in the background, check whether the copyright information at the bottom of the website is connected, and query the source code download through the file name in the website. 3. Search engine query There are many kinds of commands, and you can list several commonly used commands: Site: heimian.com context: Tube read the whole passage
    Author: qxz_xp | Published: August 22, 2014 | Classification: Rookie Entry , Hacker attack and defense | 1 comment
  • Can the mobile phone detect the hotel pinhole camera?

    As shown in the figure, a method of using mobile phones to check the hotel's pinhole camera was reprinted in major media. Many netizens were concerned about becoming the protagonist of a small pornographic film, but was this method really feasible? Today I specially asked an optical expert to discuss, and the conclusion is that whether this method is feasible depends on whether the camera has an infrared light compensator. The real pinhole camera does not have an infrared light compensator. What is exposed is a wide-angle fisheye lens. It is an optical receiving device with CCD imaging at the back. It does not emit infrared. Use your mobile phone to find red spots read the whole passage
    Author: qxz_xp | Published: August 21, 2014 | Classification: Hacker technology , Hacker attack and defense | No comment
  • I can't use up the 1M sim card to save traffic every day!

    I accidentally saw such a flow saving method that you have never heard before: sim card flow saving method, Tutorial Start: Put the sim card with words in your eyes, [make the notch in the lower left corner] Count from top to bottom, and stick the second contact on the left with transparent glue. It's the place painted red [Maybe the card is different, so it's better to try every contact once. If it doesn't work, it's the problem of the card!] After pasting, make sure the phone reads the sim card. If the access point is set to wap, it is OK! The first day of the successful mobile service only used 0.87kb, which hardly needed read the whole passage
    Author: qxz_xp | Published: August 20, 2014 | Classification: Hacker technology , Hacker attack and defense | No comment
  • Summary of ARP attack prevention methods

    0 × 001 Static binding gateway MAC 0 × 002 ARP firewall 0 × 003 VLAN and switch port binding 1. Static binding gateway MAC Method 1: Manual binding: (1) . Determine the network segment where the user's computer is located (2) . Find the gateway IP address of the user network segment (3) . Find out the user's network segment gateway Mac according to the gateway IP (4) . Use the command arp - s gateway IP gateway MAC Static binding gateway IP and MAC For example: "arp – s 192.168.1.1 AA-AA-AA-AA-AA-AA-AA". Binding IP and MAC addresses under Linux Create a static MAC –>IP corresponding table text read the whole passage
    Author: qxz_xp | Published: August 19, 2014 | Classification: Rookie Entry , Hacker attack and defense | No comment