Code to kill firewall process during intrusion
Code to kill firewall process during intrusion...
2007-01-01
A little understanding of the default account and password of Serv-U 6.0.0.2
A little understanding of the default account and password of Serv-U 6.0.0.2...
2007-01-01
The fastest way to decrypt MD5 in history (recommended)
The fastest way to decrypt MD5 in history (recommended)...
2007-01-01
Analyze what did
It is by opening the module space of the process msv1_0.dll, and then searching for the first 32 C0 after the feature value 8B 4D 0C 49. This 32C0 assembly code xor al,al, and modifying it to B001 corresponding assembly code mov al,1. Why don’t mov al,1, and no password is used in the future?
2008-06-06
Analysis and utilization of defects of Henan Mobile Network Customer Service System verification code!
Analysis and utilization of defects of Henan Mobile Network Customer Service System verification code!...
2007-01-01
After testing, it seems that the account of Administrastor is really not safe
After testing, it seems that the account of Administrastor is really unsafe...
2007-01-01
New remote control * virus targets Word
New remote control * virus targets Word...
2007-01-01
How hackers use Ms05002 overflow to find "brunch chickens" (Photo)
How hackers use Ms05002 overflow to find "brunch chickens" (picture)...
2007-01-01
Use Session to spoof the most hidden WebShell
Use Session to spoof the most hidden WebShell...
2007-01-01
Introduction to IP Spoof Technology (IP spoofing)
Introduction to IP Spoof Technology (IP spoofing)...
2007-01-01