This article discusses the security testing process for mini programs, focusing on data encryption methods like SM2 encryption. It provides a detailed guide on
This article discusses the red team assessment of a university's cybersecurity by identifying vulnerabilities in their network. It covers techniques such as inf
Discover key techniques for internal network information gathering, including methods to detect live hosts, collect service software and antivirus details, and
Explore the techniques for exploiting coupon vulnerabilities in e-commerce systems, including coupon ID traversal, concurrent issuance, and more. Understand how
This article summarizes post-penetration techniques and internal network exploration methods. It covers PHP disable_functions bypass using tools like AntSword,
This article details the process of identifying and removing cryptocurrency mining malware from a server. Learn about the steps taken to secure systems and prev