This post briefly demonstrates the configuration of bridge and router working mode of OpenWrt.
Secure Coding Practice - Injection
This series is about secure coding during development. The OWASP TOP 10 is our guide to define vulnerability type. For this part, it will focus on the vulnerable points and the mitigation of injection problems.
The Spam Filters Bypassing
Here I described some methods used to bypass the spam filters. This kind of thing is much more difficult than before and I cannot guarantee these methods will work for every mailbox.
Brief Hijack Framework of Mitmproxy
Mitmproxy is an efficient and lightweight proxy tool with convenient scripting mechanism which makes it suit most scenarios. We will disscuss how to perform a Man-in-the-middle attack with a little code in this post.
Efficient DNS Spoofing
If you seriously want to set others in your DNS spoofing trap, always remember don't let them detect anything suspicious. Bettercap is a good choice by the way.
Skydive at Mission Beach
这次在Mission Beach的跳伞行动是一时冲动下的产物,没有策划,毫无准备。在日期临近的时候才发现这件事有点疯狂,在楼上晾衣服都双腿发软的同行伙伴回复我说:“扛住压力,硬上!”
A Quantitative Trading Model with Stock Screener
This is a model that gathers some important information to decide which stock to buy. Certainly, the transaction can be made by the program itself automatically.
Get Network Traffic of Mobile APPs
This post is to talk about proposals for the mobile proxy problem. The network traffic of mobile APPs can be generally forwarded via system proxy. But what if it doesn't work?
Pointer Manipulations That Should Be Noted
I summarized a few confusing usages of pointers in C and used some code from other guys as examples.
Devices For Badusb And Badpowerbank
Here are some devices I know to perform an IoT attack, these devices can pretend things that people use most of the time, such as USB flash disk and powerbank.