","https://i-blog.csdnimg.cn/direct/4219f54b68b54a00815f9cdeb2cd1fde.png",2,"1849919734368178178","Suckerbin","https://profile-avatar.csdnimg.cn/499b41b9371c41cebde76c5b9e49939b_zhongyuekang820.jpg",[39,42,43,44],{"id":40,"name":41},50,"笔记",{"id":22,"name":23},{"id":25,"name":26},{"id":7,"name":8},1757865350000,{"id":47,"title":48,"description":49,"imgUrl":50,"views":16,"ownerId":51,"ownerName":52,"ownerHeadUrl":53,"tagList":54,"time":59},"1967231747076702210","反序列化漏洞详解","用途限制声明,本文仅用于网络安全技术研究、教育与知识分享。文中涉及的渗透测试方法与工具,严禁用于未经授权的网络攻击、数据窃取或任何违法活动。任何因不当使用本文内容导致的法律后果,作者及发布平台不承担任何责任。渗透测试涉及复杂技术操作,可能对目标系统造成数据损坏、服务中断等风险。读者需充分评估技术能力与潜在后果,在合法合规前提下谨慎实践。","","1945405651001323522","jieyu1119","https://i-avatar.csdnimg.cn/bab018f53dfe43c38c373e4307630c2d_hj06112.jpg",[55,56],{"id":7,"name":8},{"id":57,"name":58},50558,"漏洞原理",1757859572000,{"id":61,"title":62,"description":63,"imgUrl":64,"views":65,"ownerId":66,"ownerName":67,"ownerHeadUrl":68,"tagList":69,"time":77},"1967198527828312065","Day43 PHP(mysql不同注入类型、mysql不同注入点、mysql传输不同数据类型 )","实际:我们未知sql是哪种类型,只能靠试/使用sql工具原理:闭合程序员写的sql语句,并且执行我们所需要的sql语句,最后将闭合后多余的 ' 用--+ 或者#注释掉。 总结一下就是先闭合,后注释。","https://i-blog.csdnimg.cn/direct/6036a2bba5de44dea65ea09ec1790275.png",1,"1898742243901689858","Codingwiz_Joy","https://profile-avatar.csdnimg.cn/cc868fa2b7184dd2ac63365d106f4551_2401_84908950.jpg",[70,71,74],{"id":7,"name":8},{"id":72,"name":73},484,"php",{"id":75,"name":76},3986,"安全性测试",1757851652000,{"id":79,"title":80,"description":81,"imgUrl":82,"views":83,"ownerId":84,"ownerName":85,"ownerHeadUrl":86,"tagList":87,"time":103},"1967169507455713282","2025年渗透测试面试题总结-67(题目+回答)","安全领域各种资源,学习文档,以及工具分享、前沿信息分享、POC、EXP分享。不定期分享各种好玩的项目及好用的工具,欢迎关注。","https://i-blog.csdnimg.cn/direct/2ea6508e11f348769528e86055da4fc5.png",6,"1850017353979400193","独行soc","https://profile-avatar.csdnimg.cn/default.jpg",[88,91,94,95,96,97,100],{"id":89,"name":90},17,"网络",{"id":92,"name":93},58,"python",{"id":22,"name":23},{"id":25,"name":26},{"id":7,"name":8},{"id":98,"name":99},164,"adb",{"id":101,"name":102},253,"渗透测试",1757844733000,{"id":105,"title":106,"description":107,"imgUrl":108,"views":65,"ownerId":109,"ownerName":110,"ownerHeadUrl":111,"tagList":112,"time":120},"1967124351633375234","【SQL注入】延时盲注","sleep(n): 核心延时函数。使数据库程序暂停 n秒。if(condition, true_expr, false_expr): 条件判断函数。如果 condition为真,执行 true_expr,否则执行 false_expr。用于将延时与判断条件绑定。","https://i-blog.csdnimg.cn/direct/a18c44bbb9664a91b988a33ae5a6b405.png","1965654689439596546","emma羊羊","https://i-avatar.csdnimg.cn/b5c36b55ea684a36b876395780f6d698.jpg",[113,116,119],{"id":114,"name":115},25,"数据库",{"id":117,"name":118},59,"sql",{"id":7,"name":8},1757833967000,{"id":122,"title":123,"description":124,"imgUrl":125,"views":34,"ownerId":126,"ownerName":127,"ownerHeadUrl":128,"tagList":129,"time":131},"1967096711220346881","【攻防实战】记一次攻防实战全流程","那天我向众神祈祷,最后回答我的却只有挣扎十年依旧不甘的自己!成功究竟是馈赠还是偿还。网络安全技术学习,承认⾃⼰的弱点不是丑事,只有对原理了然于⼼,才能突破更多的限制。","https://img-blog.csdnimg.cn/2a91b0c5fdc941df82d7e92266dd1c93.png","1684034856373194753","儒道易行","https://file.jishuzhan.net/user/1684034856373194753/head.png",[130],{"id":7,"name":8},1757827377000,{"id":133,"title":134,"description":135,"imgUrl":50,"views":34,"ownerId":136,"ownerName":137,"ownerHeadUrl":138,"tagList":139,"time":142},"1966862044168765441","网站漏洞扫描要怎么处理?","在网络安全领域,网站漏洞是黑客攻击的重要突破口,而网站漏洞扫描能及时发现这些隐患。但很多小白在完成漏洞扫描后,不清楚后续该如何处理,导致漏洞一直存在,给网站安全埋下风险。下面从准备工作、处理步骤、验证维护等方面,详细讲解网站漏洞扫描的处理方法。","1930568995261952002","王火火(DDoS CC防护)","https://i-avatar.csdnimg.cn/82605b5bee2349c381d8209c30361533_Q3005642159.jpg",[140,141],{"id":25,"name":26},{"id":7,"name":8},1757771428000,{"id":144,"title":145,"description":146,"imgUrl":147,"views":148,"ownerId":149,"ownerName":150,"ownerHeadUrl":151,"tagList":152,"time":169},"1966741104663511041","【论文阅读】Towards Privacy-Enhanced and Robust Clustered Federated Learning","这篇论文针对聚类式联邦学习(CFL)中存在的隐私泄露风险(梯度反演攻击)和恶意客户端中毒攻击问题展开研究。作者提出了一个名为 ProCFL 的框架,通过梯度无关的相似性度量与聚类结合同伴验证机制,在提升隐私保护的同时增强了对攻击的抵御能力。实验结果表明,ProCFL在非IID和对抗场景下都能取得比现有方法更好的鲁棒性与模型性能。","https://i-blog.csdnimg.cn/direct/713a1deeb0b64f3cb91a6d887e361da6.png",3,"1859275047131156481","wzx_Eleven","https://profile-avatar.csdnimg.cn/f8f5a5e7b7df4bc2b7366eb0782f60e0_wzx_442011334.jpg",[153,156,159,162,165,168],{"id":154,"name":155},37,"论文阅读",{"id":157,"name":158},39,"人工智能",{"id":160,"name":161},97,"算法",{"id":163,"name":164},141,"机器学习",{"id":166,"name":167},142,"支持向量机",{"id":7,"name":8},1757742594000,{"id":171,"title":172,"description":173,"imgUrl":174,"views":175,"ownerId":176,"ownerName":177,"ownerHeadUrl":178,"tagList":179,"time":192},"1966506677370929153","小迪安全v2023学习笔记(八十一讲)—— 框架安全&ThinkPHP&Laravel&Struts2&SpringBoot&CVE复现","首先开启靶机:然后我们就直接使用工具一把梭就好了,项目地址:https://github.com/zhzyker/CVE-2021-3129","https://i-blog.csdnimg.cn/direct/c652301541aa4b47a13090fdbc37277c.png",5,"1952357700880347137","lingggggaaaa","https://profile-avatar.csdnimg.cn/02647647a1ed4c9297b61b956636a815_lingggggaaaa.jpg",[180,181,184,187,188,189],{"id":40,"name":41},{"id":182,"name":183},84,"学习",{"id":185,"name":186},100,"struts",{"id":22,"name":23},{"id":7,"name":8},{"id":190,"name":191},1247,"laravel",1757686702000,{"id":194,"title":195,"description":196,"imgUrl":197,"views":83,"ownerId":198,"ownerName":199,"ownerHeadUrl":200,"tagList":201,"time":212},"1966483097841090562","⸢ 肆-Ⅰ⸥ ⤳ 默认安全建设方案:c-1.增量风险管控","👍点「赞」📌收「藏」👀关「注」💬评「论」在金融科技深度融合的背景下,信息安全已从单纯的技术攻防扩展至架构、合规、流程与创新的系统工程。作为一名从业十多年的老兵,将系统阐述数字银行安全体系的建设路径与方法论,旨在提出一套可落地、系统化、前瞻性的新一代安全架构。","https://i-blog.csdnimg.cn/direct/8ebfbf8ee64842c0b3ea2889d56402f8.png","1955473488600412161","Whoami!","https://i-avatar.csdnimg.cn/fdebafd4b5114bccad8cec8ef154d8ae_weixin_42115157.jpg",[202,203,206,209],{"id":7,"name":8},{"id":204,"name":205},195,"信息安全",{"id":207,"name":208},3800,"安全架构",{"id":210,"name":211},81563,"风险控制",1757681080000,{"id":214,"title":215,"description":216,"imgUrl":50,"views":148,"ownerId":217,"ownerName":218,"ownerHeadUrl":219,"tagList":220,"time":223},"1966481058855698434","CTF-Web手的百宝箱","@ZZHow(ZZHow1024)命令注入以及常见绕过方式_命令注入绕过-CSDN博客","1956795337150083073","ZZHow1024","https://i-avatar.csdnimg.cn/fd802cc9683449e3a0e330497cd41fb5_weixin_40483399.jpg",[221,222],{"id":25,"name":26},{"id":7,"name":8},1757680594000,{"id":225,"title":226,"description":227,"imgUrl":228,"views":229,"ownerId":230,"ownerName":231,"ownerHeadUrl":232,"tagList":233,"time":246},"1966459466503208962","汽车网络安全 CyberSecurity ISO/SAE 21434 测试之一","在智能网联和自动驾驶技术进入汽车行业之前,功能安全 一直是汽车开发的核心。简单来说,功能安全的目标是确保车辆的系统在出现故障时,不会对人、环境或者设备造成危害。比如,刹车失灵了,系统能不能及时切换到备用模式?这就是功能安全要解决的问题。","https://i-blog.csdnimg.cn/direct/55a113fb0a794123b05af7ff308f441f.png",7,"1966459471607676930","猫耳君","https://profile-avatar.csdnimg.cn/2fa43bebb30842e38eb3287f88db6842_qq_21649903.jpg",[234,235,236,237,240,243],{"id":92,"name":93},{"id":22,"name":23},{"id":7,"name":8},{"id":238,"name":239},355,"汽车",{"id":241,"name":242},20917,"iso/sae 21434",{"id":244,"name":245},79837,"cybersecurity",1757675446000,{"id":248,"title":249,"description":250,"imgUrl":251,"views":252,"ownerId":253,"ownerName":254,"ownerHeadUrl":255,"tagList":256,"time":269},"1966408296103460865","服务器内部信息获取","比赛题库-服务器内部信息获取路漫漫其修远兮,吾将上下而求索。flag{22,111,6000}flag{BqMkbn}","https://i-blog.csdnimg.cn/direct/a584cdf4e31844768bb26d9f15fbdb5c.png",4,"1966408300377456642","Rum_0M","https://profile-avatar.csdnimg.cn/bb52d6dcfcc44b8aa617517186172e31_wdnmddbl.jpg",[257,260,263,264,265,266],{"id":258,"name":259},10,"运维",{"id":261,"name":262},11,"服务器",{"id":25,"name":26},{"id":7,"name":8},{"id":204,"name":205},{"id":267,"name":268},79605,"职业技能大赛",1757663246000,{"id":271,"title":272,"description":273,"imgUrl":50,"views":252,"ownerId":136,"ownerName":137,"ownerHeadUrl":138,"tagList":274,"time":282},"1966407104849821697","高防IP怎样抵御CC攻击的频繁侵扰?","在当今复杂的网络环境中,CC(Challenge Collapsar)攻击成为了网站运营者们头疼不已的问题。它通过模拟正常用户请求,耗尽目标服务器资源,导致网站无法正常服务。而高防IP作为网络安全防护的重要手段,备受关注。",[275,276,279],{"id":7,"name":8},{"id":277,"name":278},88238,"高防ip",{"id":280,"name":281},100618,"cc攻击",1757662962000,{"id":284,"title":285,"description":49,"imgUrl":50,"views":252,"ownerId":51,"ownerName":52,"ownerHeadUrl":53,"tagList":286,"time":289},"1966404034283749377","框架漏洞详解",[287,288],{"id":7,"name":8},{"id":57,"name":58},1757662230000,{"id":291,"title":292,"description":293,"imgUrl":50,"views":34,"ownerId":217,"ownerName":218,"ownerHeadUrl":219,"tagList":294,"time":297},"1966348867056222210","sqlmap常用命令","@ZZHow(ZZHow1024)",[295,296],{"id":25,"name":26},{"id":7,"name":8},1757649077000,{"id":299,"title":300,"description":301,"imgUrl":50,"views":148,"ownerId":302,"ownerName":303,"ownerHeadUrl":86,"tagList":304,"time":310},"1966153781328527362","渗透测试真的能发现系统漏洞吗","渗透测试在发现系统漏洞方面是非常有效的,但它也受到多种因素的影响。一、渗透测试的定义与目的及有效性实例","1911820183943053314","2301_78078966",[305,306,307,308,309],{"id":261,"name":262},{"id":89,"name":90},{"id":22,"name":23},{"id":25,"name":26},{"id":7,"name":8},1757602565000,{"id":312,"title":313,"description":314,"imgUrl":50,"views":315,"ownerId":316,"ownerName":317,"ownerHeadUrl":318,"tagList":319,"time":328},"1966132042452221953","高防IP如何抵御CC攻击?2025年全面防护机制解析","智能流量清洗与行为分析,让频繁侵扰成为历史在2025年的网络环境中,CC攻击(Challenge Collapsar)已成为网站运营者的噩梦。这种应用层DDoS攻击通过模拟海量真实用户请求,精准消耗服务器CPU、内存和数据库连接资源,导致正常用户无法访问服务。与传统流量型DDoS攻击不同,CC攻击具有低带宽消耗、高隐蔽性的特点,使其更难被传统防火墙检测和防御。",9,"1909579017021358081","上海云盾商务经理杨杨","https://i-avatar.csdnimg.cn/4db03118dd0e45f1b083adffeefe470f_2403_86962125.jpg",[320,321,324,327],{"id":89,"name":90},{"id":322,"name":323},83,"网络协议",{"id":325,"name":326},85,"tcp/ip",{"id":7,"name":8},1757597382000,{"id":330,"title":331,"description":332,"imgUrl":50,"views":34,"ownerId":333,"ownerName":334,"ownerHeadUrl":335,"tagList":336,"time":342},"1965969777023303682","XSS 跨站脚本攻击剖析与防御 - 第一章:XSS 初探","跨站脚本(Cross - Site Scripting,XSS)是 Web 应用程序中常见的安全漏洞。攻击者利用 Web 应用程序对用户输入过滤不足的漏洞,将恶意的脚本代码(包含 HTML 代码和 JavaScript 脚本等)注入到用户浏览的网页中。当其他用户浏览这些网页时,恶意代码会在受害者主机的浏览器中执行,从而达到劫持用户会话、窃取 Cookie 资料、钓鱼欺骗等目的。例如,2011 年 6 月新浪微博爆发的 XSS 蠕虫攻击,仅 16 分钟就感染近 33000 个用户,危害十分严重。","1943186900684156930","在安全厂商修设备","https://i-avatar.csdnimg.cn/f855d452777d4d499b611a8806369450_weixin_44981118.jpg",[337,338,339],{"id":25,"name":26},{"id":7,"name":8},{"id":340,"name":341},2331,"xss",1757558695000,"2303247",true,["Reactive",346],{"$sisPC2":347},false,["Set"],["ShallowReactive",350],{"KoELoR-VMpikMPJp97vzmVENLp6AUOjhjsw17FtXlJs":-1,"Yqw3r1h8JY1sLbax3kmGsx-jqdBigo0WI5pzZNxls-o":-1,"i-atldP1vQn6trzmwAlEy_7v7CEjp_jG1K0UPqbo85o":-1},"/tag/154"]