当前位置:网站首页>Flow characteristics of kitchen knife, ant sword, ice scorpion and Godzilla
Flow characteristics of kitchen knife, ant sword, ice scorpion and Godzilla
2022-07-05 17:18:00 【qq_ fifty-one million five hundred and fifty thousand seven hun】
Ant sword :
ini_set
ini_set_time
ini_set_limit
@ini_set(“display_errors”,“0”)
Part of the code is transmitted in clear text , Better identification
kitchen knife :
The old version adopts plaintext transmission , It's very recognizable
The new version uses base64 encryption , The detection idea is to analyze traffic packets , Find a lot of base64 You need to pay attention to encrypting ciphertext
Ice scorpion :
Ice scorpion 1: Ice scorpion 1 There is a key negotiation process , This process is plaintext transmission , And there are two flows , Used to verify
Ice scorpion 2: Because there are many built-in UA head , So when one is the same IP Repeated requests , however UA You need to pay attention when your head is different
Ice scorpion 3: Because the negotiation process is omitted , So you can bypass a lot of traffic , But other features remain , such as ua head
Ice scorpion packets are always accompanied by a large number of content-type:application What, what , No matter what GET still POST, Requested http in ,content-type by application/octet-stream
And their accept Such lengths are always equal , Normally, according to the application scenario and different files , The length is different
Godzilla :
cookie There is a small mistake in this value , Is a normal request cookie There is no semicolon at the end , Subsequent authors may make adjustments
And response , Godzilla will respond three times , And I think there is another place to pay attention to webshell Connect , Therefore, a long-term connection is usually set , therefore connection It's going to be here keep-alive
边栏推荐
猜你喜欢
机器学习01:绪论
项目引入jar从私服Nexus 拉去遇到的一个问题
Iphone14 with pill screen may trigger a rush for Chinese consumers
干货!半监督预训练对话模型 SPACE
【性能测试】jmeter+Grafana+influxdb部署实战
IDC报告:腾讯云数据库稳居关系型数据库市场TOP 2!
CMake教程Step4(安装和测试)
Using C language to realize palindrome number
thinkphp3.2.3
WR | Jufeng group of West Lake University revealed the impact of microplastics pollution on the flora and denitrification function of constructed wetlands
随机推荐
【jmeter】jmeter脚本高级写法:接口自动化脚本内全部为变量,参数(参数可jenkins配置),函数等实现完整业务流测试
In depth understanding of redis memory obsolescence strategy
Machine learning compilation lesson 2: tensor program abstraction
MYSQL group by 有哪些注意事项
【729. 我的日程安排錶 I】
[729. My schedule I]
手机开证券账户安全吗?怎么买股票详细步骤
PHP talent recruitment system development source code recruitment website source code secondary development
Embedded UC (UNIX System Advanced Programming) -2
Embedded -arm (bare board development) -1
Application of threshold homomorphic encryption in privacy Computing: Interpretation
ECU简介
Embedded-c Language-2
域名解析,反向域名解析nbtstat
Error in composer installation: no composer lock file present.
启牛商学院股票开户安全吗?靠谱吗?
Tips for extracting JSON fields from MySQL
Embedded UC (UNIX System Advanced Programming) -3
阈值同态加密在隐私计算中的应用:解读
【剑指 Offer】63. 股票的最大利润