slot777 slot stm32microm – Page 5 – stm32microm

Author name: stm32microm

How to become a security engineer after studying hacking for more than ten years?

1 Introduction To be honest, until now, I think that the vast majority of readers who read my article will eventually give up. The reason is very simple. After all, self-study is a learning method suitable for very few people, and it is very, very slow. There are too many variables in the process, and …

How to become a security engineer after studying hacking for more than ten years? Read More »

Kali Linux uses MSF to hack into Android phones

1. What is msf msfvenom a Metasploit standalone payload generator, Also a replacement for msfpayload and msfencode. It is a software used to generate backdoors. MSFvenom is a combination of Msfpayload and Msfencode, putting both tools in one Framework instance. Since June 8, 2015, msfvenom replaced msfpayload and msfencode. demo environment Demo operation with Kali …

Kali Linux uses MSF to hack into Android phones Read More »

This article takes you to develop the security of blog projects

I. Introduction Earlier, we have basically completed the myblog project using native nodejs, let’s learn how to protect the security of our project… sql injection: steal database content XSS attack: Stealing front-end cookie content Password encryption: to ensure user information security (important!) We only focus on prevention at the web server (nodejs) level Two, security …

This article takes you to develop the security of blog projects Read More »

【Mobile security】—apk decompilation basis and static analysis

1. Common terms 1. APK file It is the abbreviation of Android Package, which is the Android installation package. In fact, the APK file is presented in the form of a compressed package. By directly transferring the packaged APK file to the Android emulator or Android phone for execution and installation, various APP programs we …

【Mobile security】—apk decompilation basis and static analysis Read More »

Introduction to building a scanner

1. Establish a Python development environment 1. Download environment The Python download site (http://www.python.org/download/) provides Python installation packages on Windows, Mac OS X and Linux. If you’re running Mac OS X or Linux, a Python interpreter is pre-installed on your system. The installer provides program developers with the Python interpreter, standard library, and several built-in …

Introduction to building a scanner Read More »

5 Vulnerability Scanning Tools: Practical, Powerful, Comprehensive (Including Open Source)

introduction Vulnerability scanning is a kind of security detection behavior, and it is an important network security technology. It can effectively improve network security, and vulnerability scanning is an active preventive measure, which can well avoid hacker attacks and prevent disasters. Before it happens. So what are the easy-to-use vulnerability scanning tools? The answer is …

5 Vulnerability Scanning Tools: Practical, Powerful, Comprehensive (Including Open Source) Read More »

Consumer MCU

Consumer MCU is really not working?

The recent consumer electronics market “winter” will come, consumer electronics chips are also affected, before the smartphone cut single let cell phone TDDI caused widespread discussion, the recent consumer MCU price reduction news and rumors. A few days ago, a spokesman for Taiwan-based Holtek Semiconductor (hereinafter referred to as “Holtek”) said that the pricing of …

Consumer MCU is really not working? Read More »

Scroll to Top