• Technical Disclosure "QQ Space" Automatically Forwards Bad Information

    We often see that QQ space automatically forwards some bad information with links, even though our QQ password has not been stolen. Recently, through the analysis of a QQ space automatic forwarding link, it was found that the automatic forwarding mechanism carefully constructed the code to obtain the user's QQ number and key value by using the vulnerable page of Tencent website, thus obtaining some sensitive operation permissions of the user. And through this vulnerability, it automatically forwards some bad information to induce users to click, thus leading to large-scale dissemination. Communication phenomenon If one day, you find many Q's read the whole passage
    Author: qxz_xp | Published: August 23, 2015 | Classification: Hacker technology , Hacker attack and defense | 2 comments
  • Talk about sandbox security of terminals and mobile devices

    0×01 Background Please specify the original reprint of Ziwen! Mobile terminals or terminals can be seen everywhere in the city where we live every day. The terminal is generally composed of a touch display and a host. For example, the atm machine of the bank, the ktv, the song request machine, and the self-service machine of the unicom business hall. The security of these things is not very high. Generally, they are composed of a win or linux operating system and a sandbox. What we need to do is to jump out of the sandbox. Once the sandbox jumps out and our permissions are high enough, we can do something read the whole passage
    Author: qxz_xp | Published: August 14, 2014 | Classification: Hacker technology , Hacker attack and defense | No comment
  • A Brief Talk on Some Mistaken Ideas of Novice Seeking XSS

    1. Myth 1: XSS does not specifically "bypass" restrictions. To make a simple analogy, how can you break into a gate that has been guarded layer upon layer, with numerous thorns in front of you, and you are alone? At this time, you should realize that it is impossible to walk through the gate. In fact, there are many small doors that can enter the city defense that we want to break through, even without any means. Why don't we go? XSS is very defensible. It's just filtering. So we don't want to place too much hope on the faulty filtering logic of programmers read the whole passage
    Author: qxz_xp | Published: April 12, 2014 | Classification: Rookie Entry , Hacker attack and defense | No comment