Lab - Burpsuite - Intruder 发现敏感目录
[toc] Burpsuite - Intruder 发现敏感目录 在burpsuite的proxy栏目中,找到对WackoPicko路径的请求报,右键选择‘Send to intruder’ 切换到Intruder栏目下的Position选项 被 § 包裹着的字段,高亮显示的 这些字段是Intruder在每次请求中都会更改的字段,单击Cl...
[toc] Burpsuite - Intruder 发现敏感目录 在burpsuite的proxy栏目中,找到对WackoPicko路径的请求报,右键选择‘Send to intruder’ 切换到Intruder栏目下的Position选项 被 § 包裹着的字段,高亮显示的 这些字段是Intruder在每次请求中都会更改的字段,单击Cl...
[toc] time Machine: Time Step 1: Recon nmap -sC -sV 10.129.32.8 Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-31 00:21 UTC Nmap scan report for ip-10-129-32-8.ec2.internal (10.129....
Lab - HTB - Hard - Feline (HackyHour5) Initial: Recon NMAP CVE in 2020 Gain access to shell Port 8080 b...
HackyHour0 - Entry HackyHour0 - Entry o$ nmap -sC -sV 10.10.10.27 Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-13 21:29 EST Error #487: Your port specifications are illegal. Example ...
Lab - HTB - Setup starting point invite Lab - HTB - Setup starting point Connections to the lab environment are made with OpenVPN, which comes pre-installed on Par...
FB - Trino (Presto) basic 背景及发展 特点 架构 Presto 服务进程 Presto 模型 Presto 查询执行模型 Presto/trino数据可视化查询 ...
Apache Spark basic 基本概念 Spark产生的背景:大数据问题 相关概念 计算模型 Hadoop与Spark的区别 RDD - Resilient Distributed Datasets basic ...
BigData - MongoDB overall Compponent 数据库 Database 文档 Document 集合 collections capped collections 元数据 ...
BigData - MongoDB Projects overall Beginners with Source Code for Practice Beginner Level: Develop a Football Statistics App Create a Project for Pr...
Apache Hadoop history basic Hadoop 核心 HDFS - Storage unit MapReduce YARN usages Apache Hadoop histo...
Batch basic Batch Processing vs Stream Processing user case Batch basic Batch Processing vs Stream Processing user ...
[toc] CVE Common Vulnerabilities and Exposures a program launched in 1999 by MITRE to identify and catalog vulnerabilities in software or firmware into a free “dictionary” for organization...
[toc] Vulnerability Management I. Foreword breaking down complex problems into more manageable repeatable parts: detection, reporting, and remediation. The guide solely focuses on b...
Secure Coding Review and Analysis benefits 5 Tips to a Better Secure Code Review Top 10 Secure Coding Practices Common Techniques Static Analysis ...
[toc] ref SaaS: Single Tenant vs Multi-Tenant - What’s the Difference? Saas Single Tenant A single instance of the software and supporting infrastructure serve...