当前位置:网站首页>(6) Web security | penetration test | network security encryption and decryption ciphertext related features, with super encryption and decryption software
(6) Web security | penetration test | network security encryption and decryption ciphertext related features, with super encryption and decryption software
2022-07-02 13:04:00 【Black zone (rise)】
Super encryption and decryption tool :
link :https://pan.baidu.com/s/1lmi8bF5N5_cIYT6QG99TDQ
Extraction code :hj12
Many common web addresses are encrypted , prevent sql Inject
Analysis of common encryption and coding algorithms
MD5,SHA,AES, Base number , Time stamp ,URL,BASE64,Unescape,DES etc.
Understand the characteristics of conventional encryption algorithms
Length digits , Character law , The code analysis , Search for, etc
md5 encryption ( Default 32 position , Irreversible )
After encryption is 16 Bit or 32 A character , It consists of letters and numbers , Letters are case sensitive , Theoretically, it cannot be decrypted , Unless we crack it violently
SHA encryption
SHA-1 The encrypted ciphertext is 40 Characters , And it is composed of numbers and letters
SHA256 64 Character composition
SHA384 96 Character composition
SHA512 128 Character composition
(1 The letters seem to be lowercase , I don't know if I haven't encrypted enough )
AES encryption
The larger the number of data blocks , More output
128 position base64 Output 24 position hex Output 32 position
192 position base64 Output 32 position hex Output 48 position
Time stamp
Time stamp (Unix timestamp) Transformation tool - Online tools (tool.lu)
URL encryption
The code is characterized by a string % Two character style .
URL The encoding is a character ascii The hexadecimal of the code , Then you need to add “%”.
for example “\”, its ascii Code is 92,92 The hexadecimal of is 5c, therefore “\” Of URL The encoding is %5c.
BASE64
The length characteristic of ciphertext string is 4 Integer multiple . The symbolic value of string can only be A-Z, a-z, 0-9, +, /, = total 65 Of the characters , And = If it appears, it must appear at the end .
Analysis of common encryption forms and algorithms
Direct encryption , belt salt, With the code , With offset , Band number , Band mode , With interference , Custom combination, etc
Common decryption methods
enumeration , Custom reverse algorithm , Reversible ( Is to use various tools )
边栏推荐
- Use MySQL events to regularly perform post seven world line tasks
- js1day(輸入輸出語法,數據類型,數據類型轉換,var和let區別)
- std::vector批量导入快速去重方法
- 软件测试面试题-2022年大厂面试题合集
- 阿里发布的Redis开发文档,涵盖了所有的redis操作
- Hundreds of web page special effects can be used. Don't you come and have a look?
- Js6day (search, add and delete DOM nodes. Instantiation time, timestamp, timestamp cases, redrawing and reflow)
- Ali on three sides, it's really difficult to successfully get the offer rated P7
- 一些突然迸发出的程序思想(模块化处理)
- Js3day (array operation, JS bubble sort, function, debug window, scope and scope chain, anonymous function, object, Math object)
猜你喜欢
Floyd AcWing 854. Floyd求最短路
Redis transaction mechanism implementation process and principle, and use transaction mechanism to prevent inventory oversold
C#运算符
Modular commonjs es module
Ntmfs4c05nt1g N-ch 30V 11.9a MOS tube, pdf
js1day(輸入輸出語法,數據類型,數據類型轉換,var和let區別)
上手报告|今天聊聊腾讯目前在用的微服务架构
Five best software architecture patterns that architects must understand
Js4day (DOM start: get DOM element content, modify element style, modify form element attributes, setinterval timer, carousel Map Case)
Ltc3307ahv meets EMI standard, step-down converter qca7005-al33 phy
随机推荐
js5day(事件监听,函数赋值给变量,回调函数,环境对象this,全选反选案例,tab栏案例)
Five best software architecture patterns that architects must understand
[opencv learning] [moving object detection]
阿里发布的Redis开发文档,涵盖了所有的redis操作
[opencv learning] [image pyramid]
Interesting interview questions
How can attribute mapping of entity classes be without it?
Window10 upgrade encountered a big hole error code: 0xc000000e perfect solution
Traverse entrylist method correctly
Explain in detail the process of realizing Chinese text classification by CNN
VIM super practical guide collection of this one is enough
Efficiency comparison between ArrayList and LinkedList
8A Synchronous Step-Down regulator tps568230rjer_ Specification information
C operator
Apply lnk306gn-tl converter, non isolated power supply
[opencv learning] [template matching]
Should I have a separate interface assembly- Should I have a separate assembly for interfaces?
JDBC 预防sql注入问题与解决方法[PreparedStatement]
The UVM Primer——Chapter2: A Conventional Testbench for the TinyALU
js2day(又是i++和++i,if语句,三元运算符,switch、while语句,for循环语句)