Mountaineer & Hiker YHZ's Daily

This is a personal blog along with other stuff.

0%

This series is about secure coding during development. The OWASP TOP 10 is our guide to define vulnerability type. For this part, it will focus on the vulnerable points and the mitigation of injection problems.

Read more »

Mitmproxy is an efficient and lightweight proxy tool with convenient scripting mechanism which makes it suit most scenarios. We will disscuss how to perform a Man-in-the-middle attack with a little code in this post.

Read more »

If you seriously want to set others in your DNS spoofing trap, always remember don't let them detect anything suspicious. Bettercap is a good choice by the way.

Read more »

这次在Mission Beach的跳伞行动是一时冲动下的产物,没有策划,毫无准备。在日期临近的时候才发现这件事有点疯狂,在楼上晾衣服都双腿发软的同行伙伴回复我说:“扛住压力,硬上!”

Read more »

This post is to talk about proposals for the mobile proxy problem. The network traffic of mobile APPs can be generally forwarded via system proxy. But what if it doesn't work?

Read more »